The MyCall System - STANLEY Healthcare
Transcription
The MyCall System - STANLEY Healthcare
MyCall® System Manual VeriChip Corporation 309 Legget Drive Ottawa, ON K2K 3A3 Canada Telephone: 1-866-559-6275 or 1-613-592-6997 Facsimile: 1-613-592-4296 Web site: www.verichiphealthcare.com © 1997 - 2006 VeriChip Corporation. All Rights Reserved. Hugs, MyCall and the MyCall logo are registered trademarks of VeriChip Corporation in North America. VeriChip, the VeriChip logo, Beacon and Communicator are trademarks of VeriChip Corporation. All other company and product names may be trademarks of their respective companies. Software release 5.2. Printed in Canada. 805U0601 Rev 04. March 2006. Warranty VeriChip’s products are warranted against defects in materials and workmanship and shall perform in accordance with published specifications for a period of one year. VeriChip reserves the right to change specifications without notice. Limitation of Liability This Product has been designed for use to assist personnel in summoning help when they are under personal duress. The range, accuracy, function and performance of this Product may vary from the published specifications due to many factors, including, without limitation, site impairments from structural effects, metal objects in the vicinity, placement of the receiver and transmitter, interference from other electrical devices, atmospheric effects, installation, and maintenance. There may be other factors, which also affect performance of this Product. VeriChip does not guarantee that this Product will detect 100% of the calls for personal assistance. VeriChip does not guarantee that this Product will not return false reports of calls for personal assistance. Monthly testing and maintenance of this Product, as described in the Product documentation, is essential to verify the system is operating correctly and to ensure that the probability of detecting an alarm and/or locating the transmitter are maximized. The failure to undertake regular testing and maintenance will increase the risk of system failure and failure to report personal duress calls. The failure to undertake regular testing and maintenance will increase the risk of false reports of calls for personal assistance. VeriChip hereby disclaims all warranties, express or implied, arising out of or in connection with any of its Products of the use or performance thereof, including but not limited to, where allowable by law, all other implied warranties or conditions of merchantable quality and fitness for a particular purpose and those arising by statute or otherwise in law or from a course of dealing or usage of trade. VeriChip’s liability to you or anyone claiming through or on behalf of you with respect to any claim or loss arising out of the use or misuse of VeriChip’s Product, defective products or materials, improper installation or maintenance of VeriChip’s Product or products or the system in which they are incorporated, or alleged to have resulted from an act or omission of VeriChip or any person, negligent or otherwise, shall be limited to: A) the repair or replacement of defective Product or materials supplied by VeriChip during the warranty period as set out in the Product documentation; or, at the option of VeriChip, B) refund of the purchase price of the Product supplied by VeriChip. In no event shall VeriChip be liable for general, specific, indirect, consequential, incidental, exemplary or punitive damages or any losses or expenses suffered by you or anyone else, whether or not VeriChip, or its employees, officers, agents, resellers or installers has been informed of the risk of such loss or expense and whether or not such losses or expenses were foreseeable. License VERICHIP LICENSE AGREEMENT This is a legal agreement between you (either an individual or an entity) and VeriChip (“VeriChip”). By opening the seal disc envelope you are agreeing to be bound by the terms of this agreement. If you do not agree with the terms of this agreement, promptly return the unopened disk envelope and the accompanying items (including user manuals and other written materials) to the location where you obtained them. The software which accompanies this license agreement (the “Software”) is warranted against defects in materials and workmanship and shall perform substantially in accordance with the accompanying written materials for a period of one year. Should a product fail within this period it shall be repaired or replaced free of charge. VeriChip does not warrant that the operation of the Software will be uninterrupted or error free. VeriChip does not represent that any product will prevent bodily injury or damage to property. This warranty is void if the product has been dismantled, altered or abused in any way. EXCEPT FOR THE WARRANTIES SPECIFIED IN THIS AGREEMENT, THERE ARE NO WARRANTIES OR CONDITIONS, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OR CONDITIONS OF FITNESS FOR PURPOSE, MERCHANTABILITY OR FUNCTION OF THE SOFTWARE FOR A PARTICULAR PURPOSE AND THOSE ARISING BY STATUTE OR OTHERWISE IN LAW OR FROM A COURSE OF DEALING OR USAGE IN TRADE. USE OF THE SOFTWARE IS ENTIRELY AT YOUR SOLE RISK. VERICHIP WILL NOT BE LIABLE FOR: (A) HARM TO OR LOSS OF YOUR RECORDS OR DATA; (B) ANY CLAIMS AGAINST YOU BY THIRD PARTIES; OR (C) ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES, INCLUDING BUT NOT LIMITED TO LOST PROFITS, LOST BUSINESS REVENUE, OR FAILURE TO REALIZE ON SAVINGS, EVEN IF VERICHIP HAS BEEN ADVISED OF THE POSSIBILITY OF THESE DAMAGES. THIS LIMITATION APPLIES TO ALL CLAIMS BY YOU IRRESPECTIVE OF THE CAUSE OF ACTION UNDERLYING THE CLAIM BUT NOT LIMITED TO BREACH OF CONTRACT INCLUDING FUNDAMENTAL BREACH, TORT INCLUDING NEGLIGENCE AND MISREPRESENTATION; AND BREACH OF STATUTORY DUTY. IN NO EVENT SHALL THE LIABILITY OF VERICHIP EXCEED THE COST OF THE SOFTWARE. This agreement allows you to use the Software on the VeriChip locating or monitoring system (the “System”) in the facility or premises in which the System is installed by VeriChip or its dealer(s), and make copies of the software solely for backup purposes. You must reproduce on any such copy all copyright notices and any other proprietary legends on the original copy of the Software. You may not decompile, reverse engineer, disassemble, or otherwise reduce the Software to a human conceivable form. The Software and the rights herein are not transferable except: (i) to other facilities or locations in connection with a transfer of the System that is approved in writing by VeriChip, in its sole discretion; or (ii) in connection with the transfer of ownership of the facility in which the System is installed, provided that the System is not altered thereby. Although you own the disk on which the Software is recorded, you do not become the owner of, and VeriChip retains title to, the Software, and all copies thereof. All rights not specifically granted in this agreement are specifically reserved by VeriChip. VeriChip may terminate your license if you breach any term of this agreement and do not remedy the breach within 10 days written notice of the breach. Upon termination you will immediately delete the Software from the computer in which it is installed and return all copies of the Software to VeriChip. This agreement constitutes the entire agreement of the parties with respect to the subject matter and supersedes all prior agreements, understandings, negotiations and discussions, whether oral or written, between the parties. This agreement will be governed by the laws of the Province of Ontario excluding the law of conflicts and excluding the United Nations Convention of Contracts for the Sale of Goods. You agree to attorn to the exclusive jurisdiction of the courts of the Province of Ontario which will have exclusive jurisdiction over matters in respect of this agreement. Warnings • Do not operate other software programs at the same time as the MyCall® system software—do not use these or other software: 1 Disk compression—do not use compressed disk drives. Drive compression technology is not recommended. 2 Back up programs —back up programs, including the Windows® operating system back up program, warn of problems when continuing to use the system during a backup. Also, the system does not support the use of a tape drive. Exit the Controller PC software before starting a back up session. • Turn off power management for all computers used in the System—power management can interfere with the proper operation of the MyCall system software. Environmental Information—European Union The equipment used in this system has required the extraction and use of natural resources for its production. It may contain hazardous substances that could impact health and the environment. In order to avoid the dissemination of these substances in the environment and to diminish the pressure on the world’s natural resources, VeriChip encourages you to use the appropriate local or regional take-back systems. Those systems will reuse or recycle most of the materials of your equipment once it has reached the end of its service life. The crossed-out wheeled bin symbol invites you to use those systems. If you need more information on the collection, reuse and recycling systems, please contact your local or regional waste administration. You can also contact VeriChip for more information on the environmental performances of our products. CONTENTS CHAPTER 0 Introduction 1-1 The MyCall System ......................................................................................................... 1-2 System Components ........................................................................................................ 1-3 What's New In This Edition? .......................................................................................... 1-7 The User Interface 2-1 Overview of the Main Interface ....................................................................................... 2-2 Printing ......................................................................................................................... 2-12 Getting Help ................................................................................................................. 2-13 Using the Demo Function ............................................................................................. 2-15 Initial Setup 3-1 Adding Tags..................................................................................................................... 3-2 Adding Procedures to the Alarm Window........................................................................ 3-8 Creating User Accounts ................................................................................................. 3-10 Assigning Sounds to Alarms........................................................................................... 3-16 Startup Options............................................................................................................. 3-24 Basic Procedures 4-1 Logging In to the Software............................................................................................... 4-2 Checking Tag Location and Status................................................................................... 4-4 Locating a Tag on the Map .............................................................................................. 4-5 Finding a Specific Tag...................................................................................................... 4-5 Creating Tag Memos........................................................................................................ 4-6 Changing a Tag’s Description .......................................................................................... 4-7 Contents i Responding to Alarms 5-1 The Alarm Window......................................................................................................... 5-2 Panic Alarms.................................................................................................................... 5-4 Tamper Alarms ................................................................................................................ 5-6 Supervision Timeout Alarms............................................................................................ 5-7 No Motion Detected Alarms ........................................................................................... 5-8 Tag Location Changed Alarms ......................................................................................... 5-9 Low Battery Alarms ....................................................................................................... 5-10 Installing and Configuring Devices 6-1 LonWorks Device Settings ............................................................................................... 6-2 Adding Beacon Location Markers .................................................................................. 6-12 Changing PC Alarm Properties...................................................................................... 6-15 Configuring a Pager System ........................................................................................... 6-18 Maps, Icons and Zones 7-1 Adding Facility Maps....................................................................................................... 7-2 Creating Zones ................................................................................................................ 7-5 Reports, Diagnostics and Maintenance 8-1 Viewing LAR Statistics .................................................................................................... 8-2 Generating Reports.......................................................................................................... 8-3 Tag Diagnostics ............................................................................................................. 8-10 Testing LAR Coverage ................................................................................................... 8-13 Database and File Maintenance ..................................................................................... 8-16 Updating Your System License....................................................................................... 8-21 Advanced LonWorks Device Procedures ........................................................................ 8-22 Alarm Quick Reference Index ii MyCall System Manual A-1 I-1 Chapter 1 INTRODUCTION CHAPTER 0 Welcome to the MyCall system, and thank you for choosing an VeriChip product. This manual is your guide to using the MyCall system and software. It is intended for facility staff who are responsible for administering and maintaining the system. Although you will find sections on configuring devices, the general assumption is that your system has been installed and commissioned by your Authorized Dealer. For new features and additional information not available at the time this manual was printed, check the Read Me file located on the software installation CD-ROM. Introduction 1-1 The MyCall System The MyCall system is a product for emergency response, and consists of Communicator™ personal tags (for people), Beacon™ location markers, Local Area Receivers, and a Controller PC. Each area of interest in the facility—such as a room, hallway, or entrance—is equipped with a Beacon location marker, which emits a unique location code. When a tag detects this location code, it combines this information with its own unique identification code in its transmissions to the Local Area Receivers (LARs) installed at regular intervals throughout the covered part of the facility. The LARs then relay this information to the Controller PC, which contains the software for controlling all aspects of the system’s operation. The response to tag transmissions can be tailored to meet a variety of requirements, ranging from sounding alarms to simply recording a change of tag location in the system database. Most importantly, the system enables the user to display the location of a specific tag at any time. The MyCall system includes another important feature. Staff carrying the Communicator tag can send a distress signal at any time by pressing the Panic button on the tag. The system will immediately generate an alarm showing the ID number for the Communicator tag and the exact location. The system employs a network based on the LonWorks® protocol. The Controller PC is connected over the network to every LAR, along with optional devices such as I/O Modules. All devices are continually supervised, and an alarm is automatically generated if communication is lost. 1-2 Chapter 1 MyCall System Manual System Components The MyCall system includes Communicator personal tags, Local Area Receivers, Beacons and the Controller PC. Communicator Tags The MyCall Communicator personal tag is a highly advanced micro-processor controlled transmitter. Each tag has a unique identification code. Tags receive Beacon location marker location transmissions, combine these with their own identification code, button status, and battery level, then transmit this information to the Local Area Receivers. The LARs send the information to the Controller PC over a network. The number of tags required depends upon the number of people using the system: one device is required for each person. The tags are reusable and can be transferred from one person to another. Tags can have several assigned users if they do not require the tag at the same time. For example facilities operating on shift work can share tags between shifts. The tag is battery operated (included) with typical battery life up to one year (depending on the tag’s configuration). The Controller PC monitors the tag’s battery life initiating an alarm when the battery becomes low. Changing the battery is a simple procedure easily completed within minutes. Replacement batteries may be purchased from a local supplier or from VeriChip. Figure 1.1 The MyCall Communicator tag worn around the neck. Introduction System Components 1-3 Beacon Location Markers Beacon location markers identify areas within the facility by emitting unique location codes. The number of Beacon location markers to be installed within the facility depends on the size of the facility, and the number of rooms. A Beacon location marker is required in every room, and at regular intervals in hallways and common areas. Beacon location markers receive power from nine volt lithium batteries (supplied), providing several years of use. The Controller PC monitors the Beacon location marker’s battery levels and initiates an alarm when they become low (this requires that a tag be in range to receive signals from the Beacon location marker). Changing the batteries is easily accomplished within a few minutes. No special tools are required. Other than batteries and a light occasional dusting, the Beacon location markers are maintenance free. Installation of the Beacon location marker is straight forward requiring a few minutes with no wiring required. Figure 1.2 1-4 Chapter 1 MyCall System Manual The Beacon location marker. Local Area Receivers Local Area Receivers (LARs) are radio frequency reception devices installed at regular intervals throughout the monitored area of the facility. LARs receive the tag transmissions, time stamp them, and relay them to the Controller PC via a LonWorks network. LARs are installed in ceilings, usually out of view. The Controller PC monitors the operation of each LAR to ensure a high level of operational confidence. If the LAR fails to operate for any reason, an alarm occurs. Figure 1.3 The Local Area Receiver, with antennas and mounting hardware. Introduction System Components 1-5 Controller PC and Client PCs The Windows-based Controller PC contains the MyCall system software and controls the operation of the entire system. The software displays facility floor plans and relevant system data including the status of all MyCall tags. Typically located at a Nurse Station or at a facility’s Security Station, the computer monitors and controls all system operation. The Controller PC also acts as the server for the local area network used with the MyCall system. It processes all system data and relays them to the Client PCs to enable monitoring of system activity at a number of points around the facility. The central user interface is the Xmark application, which offers advanced control through an intuitive interface that includes customized maps of the facility. All system events, such as alarms, are displayed through easy-tounderstand dialog boxes giving users a clear understanding of what has occurred. Only task-critical information is offered. The software also supports an optional touch-screen interface. User accounts can be created and authority assigned according to each facility’s requirements. The software records all activity, including alarms, within an SQL database. A variety of reports of system activity can be viewed on screen and printed, and the user can create custom reports. 1-6 Chapter 1 MyCall System Manual What's New In This Edition? The System Software CD-ROM includes a Read Me file containing the latest information on enhancements to the MyCall system software. Please read this file every time you install or upgrade the MyCall system software. Enhanced Passwords The system has an option for strong passwords. User passwords must be a minimum of 7 characters long, include at least one upper case letter, one lower case letter, one number and one non-alphanumeric character. See “Creating User Accounts” on page 3-10. More Options for Filtering Alarms at PCs Each PC can now be configured to display alarms from one, some or all Zones in the system. See page 7-5 for more information. New Report Features You can now display charts using report data generated by the system. See “Using the Charts Feature” on page 8-6 Two new reports have also been added: All Configuration Records gives the complete configuration history for the system; and Device Configuration details the current configuration of all LARs and I/O Modules in the system. See “Generating Reports” on page 8-3. New License System The license for use of the MyCall system is now stored in a license file on the Controller PC, rather than in the dongle connected to the parallel port. For upgrade installations, the license information is transferred automatically. No action is required, and the dongle may be disposed of once the upgrade is complete. Introduction What's New In This Edition? 1-7 1-8 Chapter 1 MyCall System Manual Chapter 2 THE USER INTERFACE CHAPTER 0 This chapter introduces the main elements of the MyCall system software and explains how to change basic display settings. The User Interface 2-1 Overview of the Main Interface All controls of the MyCall system software are accessed through the Map and Status Windows. These include the Main Menu, the Toolbar and Map Toolbar, and other standard Windows controls. Main Menu Toolbar Map Toolbar Map window Beacon List of Communicators PC Popup menu LAR Status window Communicator Status Window The Status Window displays information about each tag in the system, and enables you to perform actions on the tag, such as checking its status or location. You can sort the tag list using any column as the determining factor. For example, click on the Description column. The >> symbol appears and the list sorts alphabetically in ascending order. Settings Description The description column displays the descriptions or names assigned to each tag. Double-click on the field to change the description. Location This column lists the current location of the tag. 2-2 Chapter 2 MyCall System Manual Beacon—Most of the time, the location will be the name of the Beacon location marker currently seen by the tag. Unknown Location—The tag is not currently seeing a Beacon location marker. You should check the Status column for more information when you see this message. Duration Duration is the elapsed time the tag has remained at its current location. Keep in mind that this may be an unknown location. Status This column displays the current status of each tag. The following table lists tag status messages. OK—Tag operating normally. In Alarm—Tag has caused an alarm. Supervision Timeout—Tag has not been seen by the system for the supervision timeout period set for this tag. The tag is not being detected by the system. Not Detected—This message appears in place of “Supervision Timeout” if no supervision timeout period has been set for the tag. The meaning is the same: the tag is not being detected by the system. Unknown Location—The tag is not currently seeing a Beacon location marker. Prev. Location This column indicates the previous location of the tag. Beacon—Most of the time, the previous location will be the name of the Beacon location marker previously seen by the tag. Unknown Location—The tag did not see a Beacon location marker at its previous location. Popup Menu Commands Right-clicking on a tag in the list window displays the following popup window with various commands to view tags and change settings. The User Interface Overview of the Main Interface 2-3 Tag Description Selecting this command invokes a dialog box showing location information for the tag. See “Checking Tag Location and Status” on page 4-4for details. Show Map Select this command to highlight the icon for the tag in the Map Window. Edit Configuration This command opens the Tag tab of the Edit Configuration dialog box so that you can change tag settings (see page 3-2). This command will only appear if you have the appropriate user permission (see page 3-10). Edit Memo Click on this command to create a brief memo about the tag. See “Creating Tag Memos” on page 4-6 for details. Clear Alarm If the tag is in an alarm state, an command will appear at the bottom of the menu enabling you to clear the alarm. Move the cursor over the alarm and click the left mouse button. Changing the Look of the Status Window The Status Window’s column width and size can be changed. Column Width Column widths can be increased or decreased to display more or less information. You can also decrease a column until it no longer appears, effectively removing it from your display. To change a column’s width, move the mouse pointer to the border between two columns until the ←||→ symbol appears. Click and hold the left mouse button and drag the border to change the column width. To hide a column, 2-4 Chapter 2 MyCall System Manual drag the border to the left until the column no longer appears. To display the column again, move the mouse pointer to display the ←||→ symbol then click and drag the column border. Window Size The Status Window can be increased or decreased in size. However, if you increase the size of the Status Window you automatically decrease the size of the Map Window. To change the window size, move the mouse pointer to the border between the two windows until the ←||→ symbol appears. Click and hold the left mouse button and drag the border to the desired position. You can also perform this action through the Split command under the Window menu. The mouse pointer now drags the window border. Move the border to the desired position and click the left mouse button. Toolbar The Toolbar contains buttons representing the more commonly used commands. The software displays only those buttons that are applicable to your system or for which the user has access permission. You can enlarge the buttons by selecting the Large Buttons command from the View menu. To execute a command, click on the appropriate button. Print Print the displayed window Map/Status Display the Status and Map Windows Alarms Display the Alarm window (only appears when there are current alarms) Click to send a page message to facility staff equipped with pagers. Display the Edit Configuration dialog box Send Page Edit Display the User tab of the Edit Configuration dialog User Configuration box Reports Create system activity reports Login/Logoff Invoke the Login dialog box to log in to the system Windows Display the Windows Explorer About Display information about your system The User Interface Overview of the Main Interface 2-5 Map Window The Map Window displays maps representing your facility, and provides a quick overview of system activity. The location of system devices such as Beacon location markers and LARs can be seen at a glance, and tags will appear when at an Beacon location marker. Maps must be installed into the system before they will appear in the Map Window. See “Adding Facility Maps” on page 7-2 for details. Once installed, the size and appearance of the window can be changed using the Map Toolbar and other commands described below. Map Toolbar The Map Toolbar contains various commands for changing the size and character of the map appearing within the Map Window. These commands are also available from the View Menu. Zoom Map Zoom in to enlarge the map Compress Map Zoom out to shrink the map View 1 to 1 View the map at 100% scale Undo Reverse the last change Scale to Fit Change the map’s dimensions to fit the entire map into the Map Window Map dropdown list Select the map to be displayed in the Map Window. Click on the down arrow, and scroll down the list. Changing the Look of the Map Window The size and appearance of the Map Window can be changed using the commands below. Window Size The Map Window can be increased or decreased in size. However, if you increase the size of the Map Window, you automatically decrease the size of the Status Window. To change the window size, move the mouse pointer to the border between the two windows until the ←||→ symbol appears. Click and hold the left mouse key 2-6 Chapter 2 MyCall System Manual and drag the border to the desired position. You can also perform this action through the Split command under the Window menu. The mouse pointer now drags the window border. Move the border to the desired position and click the left mouse button. Changing Map Properties The Map Properties dialog box is displayed by right-clicking anywhere on the map (not on a icon), and selecting Properties from the popup menu that appears. This dialog box contains settings that apply to all maps. Show each tag icon individually—This setting displays tags separately at all times. If not selected, several tags appearing close together on a map appear as a single icon representing multiple tags. Show Beacons by ID number—Choose this setting to display the identification number, instead of the description, for all Beacon location markers. Text Size—Enter a point size for descriptions within the Map Window. Available text sizes range from 10 to 36 points. Window Menu Commands The following commands are used to control the appearance of multiple windows in the MyCall system software window. Click on the Window menu and then select the desired command. Cascade The cascade command organizes all windows to overlap each other and display their window title bars only. Tile The Tile command scales all windows to fit within the MyCall system software window. The entire window appears. The size of each window depends upon the number of open windows, resolution, and physical size of your computer display. The User Interface Overview of the Main Interface 2-7 Arrange Icons When using Windows, you can minimize any number of windows. This command arranges these icons, representing the minimized windows, in a line beginning at the bottom left hand corner of your display. Split The relative size of the Status Window and the Map Window can be changed using this command. Choose Split from the Window Menu, and then use the mouse to move the border between the two windows to the desired position. Left-click the mouse to complete the procedure. The Map and Status Windows change to the new proportions. Open Window Names All windows currently opened appear in a list here. To display a window, open the Window Menu and click on the desired window. Icon Settings Icons representing Beacon location markers, LARs and other devices are added to maps once these devices are installed and configured. See page 7-3 for information on how to add icons to maps. Hiding and Displaying All Icons The software’s default setting is to display all icons. To hide icons, right click anywhere in the Map Window not on an icon to display the following popup menu. Select Show Icons from the popup menu to turn the check mark off. To display icons, choose the command again. Hiding and Displaying Individual Icons Icons can also be hidden or shown individually. These individual settings override the Show Icons command. To hide or show an icon, right click on the 2-8 Chapter 2 MyCall System Manual icon to display a popup menu like the following. Select the Icon Properties command to invoke an Icon Properties dialog box like this one for Beacon location markers. To have the icon always appear, click the Always show the icon checkbox to display a checkmark. For Beacon location markers and LARs, you can also choose to hide or display the description that appears beneath the icon. Under Description Display, choose Never to always hide the description, Always to always show the description, or When tags are present to display the description when tags appear in the vicinity of the Beacon location marker or LAR. Moving an Icon Note To move an icon, double-click on icon of interest and hold the left mouse button. Drag the icon to the new location and then release the mouse button. Remember that icons are meant to indicate the exact installed location of a device. Only move an icon in order to more accurately reflect the device’s location. Deleting an Icon Icons can be deleted by right clicking on the icon and selecting Delete Icon from the popup menu that appears. A dialog box appears asking you to confirm your choice. Click Yes. Warning Do not delete device icons unless the device had been removed from the system. Deleting Beacon location marker icons will prevent the location of tags from being indicated on facility maps. The User Interface Overview of the Main Interface 2-9 Status Bar The Status Bar, located at the bottom of the Main Window, provides various information about the software, including who is currently logged in and the current time. Touch Screen Interface The MyCall system software supports an optional touch screen interface that replaces the mouse and keyboard. All menus and buttons are accessed by touching them with the finger, and data is entered via a virtual keyboard. The MyCall system software is compatible with any touch screen using the MicroTouch standard, which is used by a large number of manufacturers. Initial Setup The touch screen functions of the MyCall system software are enabled by checking the Touch Screen checkbox in the PC tab of the Edit Configuration dialog box. The virtual keyboard will appear and the Toolbar buttons will automatically enlarge. The Large Buttons command, accessed from the View menu, can also be used to change the size of the Toolbar buttons. You may also wish to adjust certain settings within the Windows operating system to enlarge the size of text on screen. These changes are made in the Display Settings control panel, accessed from the Windows Start button. Using the Touch Screen The touch screen display looks very similar to a standard monitor. To access a menu or select a button, simply touch it with your finger. When you select an editable field a virtual keyboard appears automatically, as in the example below. 2-10 Chapter 2 MyCall System Manual Type in the information and then touch the virtual Enter key. The keyboard will be hidden automatically. The User Interface Overview of the Main Interface 2-11 Printing You can print a variety of information generated by the system, including the tags listed in the Status Window, and reports generated with the Report function. The quickest way to print is using the print icon in the Toolbar, but you can also access the Print dialog box from the File Menu Print command. The Print dialog box offers standard Windows printing options. Click on the Properties button to choose paper size and other settings. Each printer has its own settings. Refer to your printer’s documentation for more information. Printer settings can also be made at any time by selecting the Print Setup command from the File Menu. Print Preview For reports, the software can also preview what the printed report will look like. Select the Print Preview command from the File Menu. You can zoom in and out to see the document in different resolutions. 2-12 Chapter 2 MyCall System Manual Getting Help The MyCall system software includes an online Help file with a variety of information on using and configuring the MyCall system software. You can either browse through the Help file or do a keyword search using the Search command. To open the Help file, select Help Topics from the Help Menu. In addition, you can access specific information on the active window or dialog box by pressing the F1 key. The User Interface Getting Help 2-13 Getting System Information To view basic information on your system, select the About Xmark command from the Help Menu. This dialog box identifies the MyCall system software version, the number of tags that can be used with the software and whether the system is set up to operate on a local area network. 2-14 Chapter 2 MyCall System Manual Using the Demo Function The MyCall system software offers a demonstration mode that mimics an actual system. The tags move on the map and tag messages appear along with alarms. You can even add system components, including new tags. To begin the demonstration, open the Xmark menu, choose the MyCall Demo command, and select Run to display a checkmark. Note The Demo is not available on Client PCs, and is disabled on the Controller PC as soon as the MyCall system software license is installed. Settings Run—Start the demonstration. Alarm—Simulate a MyCall Panic alarm The User Interface Using the Demo Function 2-15 2-16 Chapter 2 MyCall System Manual Chapter 3 INITIAL SETUP CHAPTER 0 Most settings for the software will have been completed by your dealer. There are, however, some procedures that should be done directly by the facility itself, because they pertain to your specific procedures and ways of using the system. These include tag alarm configuration, adding procedural tips to the alarm window, and creating user accounts. Initial Setup 3-1 Adding Tags Note Communicator personal tags may be added to the software either one at a time or as a group with identical settings. The Tag tab of Edit Configuration can be accessed from Client PCs. Simply click on the Edit button in the Toolbar. Enrolling Tags One at a Time 3-2 1 Open the Edit Configuration dialog box and select the Tag tab. 2 Click the New button. 3 Enter the ID number for the tag. Tags have different identification numbers configured at the factory. The ID number appears on the back of the tag. 4 Enter a Description for the tag. Enter a description (name) for the tag. Descriptions can be alphanumeric up to sixty characters in length. This description appears throughout the MyCall system software including the Alarm window, on maps, in reports, and when editing a tag’s settings. To rename a tag, change this description. 5 Choose a Tag Type. Choose one of the 16 icon to represent the tag on maps. To help you locate Chapter 3 MyCall System Manual tags when using the system, choose similar icons for tags representing similar groups. For example, assign the same icon shape and color to staff performing similar functions: NICU nurses, emergentologists, etc. You can also change the default tag type name. Click on the name to highlight it, then click on the entry again; enter a new name. 6 Make setting under Event Configuration. The MyCall system software responds to alarms for tags according to options chosen in this section. All alarms can be configured to log information to the database, generate an alarm, or activate a pager system (if installed). Click on a checkbox to enable a response. a) Location has changed—Choose this option to generate an alarm when a tag’s location has changed. b) Panic Button Active—You must activate this response before the system acknowledges the pressing of a Communicator tag’s Panic button. If you select Generate Alarm, you can also choose whether or not to allow multiple alarms from the same Communicator tag. To allow multiple alarms, check this checkbox. c) Tamper Button Active—This settings if used for Wall Mount Tags only. See “Wall Mounted Tags” on page 3-4. d) No Motion Timeout—This option generates an alarm if a tag remains motionless for a specified timeout period. The Timeout ranges from zero to 365 days. If set to zero, an alarm occurs as soon as a tag detects a Beacon location marker configured with this setting. You can also choose to have the alarm automatically cleared if the alarm condition ends by selecting Auto Clear. Beacon location markers must be configured in the Edit Configuration dialog box in order to initiate this alarm (see page 6-13). e) Supervisory Timeout—The Supervisory Timeout is the elapsed time period from when the system no longer detects a tag to the point the system initiates an alarm or logs the event. Supervisory timeouts range from 20 seconds to 365 days. You can also choose to have the alarm automatically cleared if the alarm condition ends by selecting Auto Clear. Set the timeout period to match the desired level of confidence for each tag. Critical items should have a very short timeout period. If however you do not require this level of confidence, choose a longer timeout period. 8 Save the settings. Click the Apply button to save the settings for the subject tag. You can also click the Apply to All button to save the Alarm Configuration to all tags or tags of the same type. Initial Setup Adding Tags 3-3 After clicking Apply to All, choose which tags to configure. To configure all tags of the same type, choose the first option ‘X’ Tag records only. To configure all tags in the system, choose All Tag records. 9 Repeat the above steps for each additional tag. Once all settings are complete, click on the OK button to close the dialog box. Wall Mounted Tags A Wall Mount Tag is an optional component that is installed in a fixed location to serve as a distress call button (in, for example, a restroom). The tag is configured by checking the Wall Mount checkbox, and then configuring it for Tamper alarms. In a typical application, an I/O Module is used to activate a sounder or light when a Tamper alarm occurs to alert staff of a problem in the restroom. The sounder or light will turn off as soon as the tag is replaced into the tag holder. (The alarm must still be cleared in the software, however.) Once configured, an icon for the Wall Mount Tag is installed on the facility map. Enrolling Several Tags at Once You can also enroll several tags at one time, provided that their ID numbers are in sequential order. All the tags will have identical settings. 1 3-4 In the Tag tab, select a tag that you would like to use as the model. This device’s settings will be applied to all the devices added. Chapter 3 MyCall System Manual 2 Click on the New ± button. 3 Enter the First New ID of the series of tags being added. 4 Enter the Last New ID of the series. 5 Choose a Description. Click on the Describe as the current record checkbox to add the entire group of tags with the same description; in this example, Wheelchair. If you do not choose this setting, descriptions default to Tag XX, with XX being each tag’s ID number. 6 Choose an Alarm Configuration. Click on the Alarm Configuration as the current record to add the entire group of tags with the same alarm configuration as the tag displayed as the Current Record. Tags in this group will have no alarm configuration if you do not choose this setting. 7 Select the Type of tag. Click on the Type as the current record to add the entire group of tags as the same type of tag as the tag displayed as the Current Record. 8 Click OK. You may wish to change descriptions or other settings for tags. Follow the procedure for adding a single tag described above. Reassigning, Replacing or Deleting Tags Tags can be reassigned, replaced, or deleted from the system. Reassigning a tag simply involves changing the description in the Edit Configuration dialog box. To replace a tag, first remove it from the system, and then use the New button to add a new tag, using the procedure described above. Be sure to assign the same description and alarm settings as the deleted tag. Use the Delete command to remove a tag. Remember to remove the tag from the person or asset. Initial Setup Adding Tags 3-5 Assigning a Picture to a Tag The MyCall system software enables you to associate a picture with each tag. In an alarm, the picture can be displayed from the Alarm Window (see page 5-3), or configured to pop-up automatically (see page 6-15). Images can be in a variety of different file formats, including jpeg, gif, bmp, txt, rtf, htm, and html. Although the image viewer window can support images of any size, it is best to have all images approximately the same size (around 300 x 300 pixels is ideal). This ensures that the user will not have to resize the viewer window for each new alarm. Images can be digitalized by scanning, or you can use a digital camera to take images. They can then be edited in a variety of applications, including Microsoft Paint. To assign images to a tag, complete the following steps: 3-6 1 Open the Edit Configuration dialog box and select the System tab. 2 Click on the Enable Pictures checkbox to activate the pop-up images feature. Click on OK to save the settings. Chapter 3 MyCall System Manual 3 In the Status Window, right-click on the tag of interest to display the following pop-up menu. Go to the Picture menu and select Set Picture. 4 In the Select Picture dialog box, navigate to the folder containing the picture. Click on it once to select it, and then click on Open. The picture is now associated with the tag. To preview it, select Show Picture from the Picture popup menu. 5 Repeat these steps for each tag that you wish to assign a picture to. Editing Picture Settings To change the picture associated with a tag, just follow the procedure above. You can also delete a picture by selecting Clear Picture from the Picture popup menu. Initial Setup Adding Tags 3-7 Adding Procedures to the Alarm Window The Alarm window can be configured to display response procedures when an alarm occurs. This can be a very useful way to ensure that staff members have the proper information to respond to an alarm. The procedures are contained in a .txt file called Procedure stored in the Xmark directory. Complete these steps to customize the alarm procedures: 3-8 1 Enable the Procedures button for the Alarm window. In the System tab of the Edit Configuration dialog box, click on the Enable Alarm Procedures checkbox. Click OK. 2 Open the Procedure.txt file, found in the Xmark directory. You can edit the file in the Windows Notepad, Microsoft Word, or any other text editing application. 3 Type the heading for the alarm in square brackets [ ] exactly as it appears in the Alarm Window. Refer to “Alarm Quick Reference” on page A-1for a full list of all alarms. 4 Enter your unique procedures under the heading for each alarm. 5 Save the Procedure.txt file in the Xmark directory. 6 If using Client PCs, open the LAN Status dialog box from the Xmark menu on the Controller and shutdown the network by clicking on the Close button. Then reconnect each Client PC to the network. This is necessary to make procedures available on the Clients. You must do this every time you make change to the Procedure.txt file. If you are also using custom Alarm Notes (see below), skip this step. Chapter 3 MyCall System Manual Note Alarms for which you have not created a heading in square brackets will display the default procedure. Requiring Users to Enter a Note when an Alarm is Cleared The system can be configured to require the user to enter a brief note whenever an alarm is cleared. The Alarm Notes dialog box offers the user a choice of preset messages about the alarm; or if they prefer, they can type their own message.The notes are stored in the database. The pre-set messages can be customized to the facility, and are saved in a .txt file called Notes stored in the Xmark directory. Complete these steps to customize Alarm Notes. 1 Enable the Alarm Notes feature. Open the System tab of the Edit Configuration dialog box, and check the Ask for notes on clearing the alarm command. Click OK. 2 Open the Notes.txt file, found in the Xmark directory. You can edit the file in the Windows Notepad, Microsoft Word, or any other text editing application. 3 Beneath the [AlarmClearNotes] heading, type in the pre-set messages for the facility, separated by a line return. The messages can be any length, but only the first 60 characters will appear in the dropdown menu. Keep the message as short as possible. 4 Save the Notes.txt file in the Xmark directory. If using Client PCs, open the LAN Status dialog box from the Xmark menu on the Controller and shutdown the network by clicking on the Close button. Then reconnect each Client PC to the network. This is necessary to make the custom Alarm Notes available on the Clients. You must do this every time you make change to the Notes.txt file. Initial Setup Adding Procedures to the Alarm Window 3-9 Creating User Accounts Access to the MyCall system software can be strictly controlled through passwords. When the password feature is on, users must log in to the system in order to gain access. The identity of the user is recorded to the database, along with all alarms and events that occur during the session. The system allows you to define different levels of access for each user by creating individual user accounts. To aid in the creation of multiple user accounts, the software contains three user templates—User, Admin, and Maintenance—with typical permissions for these types of users. These templates can be modified, and custom templates can be created. Setting up a controlled access system is a two-step process. First, create standard user templates so that you can quickly assign permissions. Then create a user account for each person who will be using the system. Note A user with a valid password may log in at any PC in the network. Step 1: Create User Templates 3-10 1 Open the User Configuration dialog box. Click on the User Configuration button in the Toolbar, or select the User Manager command from the Xmark menu. 2 Click on the User Templates button to open this dialog box. 3 To create a new template: Click on the Add button. Type in a name for the template and then make permission settings. A full list of the permissions is given on page 3-14. Chapter 3 MyCall System Manual To modify an existing template: Select the profile in the list window, and then change the permissions. Note 4 Enter a Timeout value. This is the length of time of inactivity before the software automatically logs out the user (the maximum time is 99 hours and 59 seconds). This is a security feature to ensure that the software cannot be used by unauthorized persons. 5 Under Max. Password Age, days enter the maximum number of days that the same password can be used (from 1 to 999 days). After this period has expired, the user will be prompted to change their password. Entering 0 allows the user to keep using the same password indefinitely. 6 Click OK to save your changes and close the dialog box. Existing user accounts are not affected when you change user templates. If you want to update the permissions for an account, you must select the account in the list window in the User tab, and click the Edit button. You can then use the Apply Template command to choose the desired user template. Step 2: Create a User Account for Each User Note By default, there is a single user account, Admin, with full access to the system. This account cannot be changed or deleted, and should be assigned to the System Administrator or another senior staff member. Be sure to assign a new password. Initial Setup Creating User Accounts 3-11 1 Note The System tab cannot be accessed from Client PCs. This step must be performed at the Controller PC. 2 New Feature 3-12 Turn on the password feature. Open the Edit Configuration dialog box and select the System tab. Click on the Passwords required checkbox to display a checkmark, and then set the number of times users can attempt to log in under Max Login Attempts. If a user fails to enter the right password on their last attempt, an alarm appears in the Alarm window and this information is recorded to the database. Entering 0 allows the user to attempt to log in any number of times. Optional settings: 1 Enhanced Passwords required This setting enables strong passwords for the system. User passwords must be a minimum of 7 characters long, include at least one upper case letter, one lower case letter, one number and one non-alphanumeric character (such as a dash or exclamation mark). 2 Lock User Account after Max Retries Exceeded Check this box if you wish to lock a user account if a user fails to enter the right password after the number of attempts specified under Max Login Attempts. The user will be locked out of the system until the Chapter 3 MyCall System Manual account is reset in the User Account tab (see “Editing an Existing User Account” on page 3-14). 3 Click on Apply to save the settings. Then click on the User tab. 4 To create a new user account, click on the New button, and enter a name for the user in the Login Name and Full Name fields. The Login Name must be entered every time the user logs in. The Full Name is useful for managing the system, and is stored in the database. 5 Enter a Password for the user; or leave the default password (12345) and check User Must Change Password at Next Logon. This forces the user to change his or her password the first time he or she logs in to the system. Optional setting: 6 1 For systems with TAP pager systems, enter the ID number of the pager carried by the user. This is necessary for the user to receive pages. 2 For systems using the access card reader option, you may enter access card information for each user at this point, although this is not necessary, as each user will be prompted to swipe their access card the first time they log in to the software. Click on the Passcard button, and select Set Card. Then swipe the user’s access card through the card reader to enter the data into the system. Click on the Apply Template button and select one of the user templates. Once a particular user has been assigned a template, his or her user Initial Setup Creating User Accounts 3-13 permissions can be further customized. A full list of the permissions is given below. 7 Enter a Timeout value. This is the length of time of inactivity before the software automatically logs out the user (the maximum time is 99 hours and 59 seconds). This is a security feature to ensure that the software cannot be used by unauthorized persons. 8 Under Max. Password Age, days enter the maximum number of days that the same password can be used (from 1 to 999 days). After this period has expired, the user will be prompted to change their password. Entering 0 allows the user to keep using the same password indefinitely. 9 Click Apply to save the new user account, and repeat the same procedure for each user. 10 Click on OK to exit the Edit Configuration dialog box. Editing an Existing User Account To change the permission levels of an existing user account, simply select it in the list window and click on the Edit button. You can change all fields except Login Name. This ensures that each user of the system has a unique account, so that the database accurately records who performed what actions. If you need to transfer access to the system from one staff member to another, delete the first staff member’s account and then create a new account for the new staff member. New Feature Locking and Unlocking an Account You can lock and unlock a user account by checking and unchecking the Account Locked checkbox. When an account is locked, the user cannot access the system. If the Lock User Account after Max Retries Exceeded setting is enabled in the System tab (see page 3-12), this box will automatically be checked when a user has failed to enter the right password after the number of attempts specified under Max Login Attempts. To restore system access to the user, uncheck the Account Locked checkbox. User Permissions Below is a complete list of user permissions in the software. Configuration Access: Display configuration database records—The user can display the Edit Configuration dialog box, but cannot change any settings. 3-14 Chapter 3 MyCall System Manual Add/Delete/Edit Users—The user can create, delete and change user accounts. Add/Delete/Edit Tags—The user can create, delete and change tags in the Tag tab. Modify configuration database records—The user can change settings in the Edit Configuration dialog box. LonWorks Network: Perform LonWorks network /tag diagnostics—The user can access the Tag Diagnostics dialog box. Change the LonWorks network configuration—The user can configure LonWorks devices using the Install LonWorks Devices command. Hugs Tags—For use with the Hugs application only. General Software Administration: Exit/Close the Xmark application—The user can exit the MyCall system software. Access the Windows Explorer—The user can display the Windows Explorer. Access Notepad—The user can display the Windows Notepad. Start/Stop the LAN Status Window—The user can access the LAN Status dialog box. Perform backup/restore operations—The user can access the Backup and Restore commands in the File menu. Open/Hide the Alarm Window—The user can open and hide (minimize) the Alarm Window. If this permission is not granted, the Alarm Window will stay on top until the alarm is cleared. Other Software Administration Features—The user can perform other routine maintenance, including viewing menu items, accessing Print setup, and running LapLink. Clear alarms—The user can clear alarms in the Alarm window. View Reports—The user can access the Reports dialog box. Change password—The user can change his or her password in the Login dialog box. Bypass the Exciter—For use with the Hugs applications only. Send Pages—The user can send pages using the Send Page command. Reset the IO Output Channel—The user can reset the Output for an I/O Module. Reset the IO Output Channel—The user can reset the Output for an I/O Module. Use CCTV feature—For use with the Hugs application only. Initial Setup Creating User Accounts 3-15 Assigning Sounds to Alarms To help users quickly identify alarms, the software can be configured to play different sounds on the PC when alarms occur. This feature requires that a sound card be installed in the PC and properly configured. The MyCall system software offers two ways to associate sounds with alarms. Generic alarm sounds (see page 3-18) are played whenever an alarm of a specific type occurs; no location information is provided. Specific alarm sounds (see page 3-21) provide specific information about each alarm situation. There are two options here. You can record your own customized sound files that identify the exact Beacon location marker where an alarm has occurred. Or you can use a text-to-speech engine to annunciate complete alarm information, including the tag description and the type of alarm. Sound alarms can be turned on or off for each PC in the network, but alarm messages are identical at all PCs. Adding Sound Files to the Software A number of sounds are installed along with the MyCall system software, in a folder entitled Sounds in the Xmark directory. To use them in the software, these sounds must be added in the System tab of Edit Configuration. You can also add your own customized sounds provided they are in the .wav format. To add sounds to the system, follow this procedure: 1 3-16 Copy all the custom sound (.wav) files you wish to use to the Sounds folder in the Xmark directory on the Controller PC. This ensures all files are kept together, and simplifies the copying of the files to Client PCs. Chapter 3 MyCall System Manual 2 Open the Edit Configuration dialog box and select the System tab. 3 Under Sounds, click on the Use Sound Card checkbox to display a checkmark. (This setting will only be available if a sound card is installed.) 4 Click on the New button. 5 Select the sound you wish to add, and then click OK. (You can also simply double-click on the desired sound file.) Add additional sounds in the same way. 6 Click Apply in the Edit Configuration dialog box to save your settings. The sounds will now be available in the Play Sound dropdown list. Initial Setup Assigning Sounds to Alarms 3-17 7 Copy all sound files to exactly the same location on each Client PC as on the Controller PC. By default, this is the Sounds folder in the Xmark directory. Setting Generic Alarm Sounds These alarms sounds offer general notification of an alarm. A specific sound can be associated with each type of alarm, but no location information is provided. Make sure that you have added all the sound files you wish to use to the software, and copied the files to each Client PC (see above). 3-18 1 Open the Edit Configuration dialog box and select the System tab. 2 Set the Default Sound. The Default Sound is played for all alarms for which no other sound has been selected. To change the Default Sound, click on the Browse button to search your directories and select a new sound. You must use a standard Windows sound file (.wav). The MyCall system software includes several .wav files, found in the directory Sounds in the software’s main Xmark directory. 3 Set the sound to be played for each alarm type. Sounds can be generated for most types of alarms. To set a sound, select the Chapter 3 MyCall System Manual alarm in the list window, and then choose a sound from the Play Sound dropdown list. To hear a preview of the sound, click Play. 4 Once you have assigned sounds for all alarm types, click on Apply to save your settings. 5 Next, set alarm properties for each PC in the system. Click on the PC tab and select a PC. Then click on the Alarm Properties button. 6 Click on the Use prerecorded sounds radio button to activate generic alarms. (Leave the Use location specific sounds checkbox unchecked.) 7 You may also make the following optional settings: Repeat alarm info until muted—Check to have the alarm message repeated every 20 seconds until the user mutes it by checking in the Alarm window. Alarm Filter—These checkboxes are used to determine which alarms appear on the PC. To select an alarm type, click on the checkbox to display a checkmark. You can enable all alarm types by selecting Enable all Types of Alarms. 8 Click OK to save your settings in the Alarm Properties dialog box. 9 When you have made settings for each PC that you wish to use generic alarms for, click on OK to exit the Edit Configuration dialog box. Setting Specific Alarm Sounds Two options are available for specific alarm sounds. You can record your own customized sound files that identify the exact location (the Beacon location Initial Setup Assigning Sounds to Alarms 3-19 marker) where an alarm has occurred, or you can use a text-to-speech engine to annunciate complete alarm information. Using Pre-Recorded Messages This option enables you to play a customized sound file when an alarm occurs at a specific Beacon location marker. You must record a message for each Beacon location marker in the system, and import it into the MyCall system software using the procedure described on page 3-16. It is important that the message identify only the location of the alarm, and not the type of alarm. The message will be played for any alarm where location is known to the system. A generic sound will be played for alarms where location is not known. To implement pre-recorded sound alarms for the MyCall system software, complete the following steps. 3-20 1 Record a separate .wav file for each Beacon location marker in your system, and import it into the MyCall system software (see page 3-16.) 2 Open the Edit Configuration dialog box and select the Beacon tab. 3 Select a Beacon location marker in the device window. From the Sound dropdown menu, select the sound file to be played when an alarm occurs at that Beacon location marker. Chapter 3 MyCall System Manual When you have assigned a sound to each Beacon location marker, click Apply to save your settings. 4 Next, set alarm properties for each PC in the system. Click on the PC tab and select a PC. Then click on the Alarm Properties button. 5 Click on the Use prerecorded sounds radio button, and then check Use location specific sounds. 6 You may also make the following optional settings: Repeat alarm info until muted—Check to have the alarm message repeated every 20 seconds until the user mutes it by checking in the Alarm window. Alarm Filter—These checkboxes are used to determine which alarms appear on the PC. To select an alarm type, click on the checkbox to display a checkmark. You can enable all alarm types by selecting Enable all Types of Alarms. 7 Click OK to save your settings in the Alarm Properties dialog box. 8 When you have made settings for each PC that you wish to use voice alarms for, click on OK to exit the Edit Configuration dialog box. Using a Text-to-Speech Engine A text-to-speech engine reads the alarm information provided by the MyCall system software, and annunciates it using a simulated voice. The message has the following format: “New alarm. [Tag or device description]. [Alarm type]. Location at [Beacon location marker name].” Initial Setup Assigning Sounds to Alarms 3-21 The standard Windows text-to-speech engine is installed as part of the MyCall system software, and can be configured from the Speech Properties control panel. It includes a few simulated voices, but others are available from a variety of vendors. To implement text-to-speech sound alarms for the MyCall system software, complete the following steps. 3-22 1 From the Windows Start button, go to Settings and then Control Panel. Double-click on Speech to open the Speech Properties control panel. 2 From the Voice selection dropdown menu, select the voice to be used to annunciate alarms. (Click on the Preview Voice button to hear a sample.) You may also wish to adjust the speed using the Voice speed slide bar, although in most cases the default setting is best. 3 Click on OK to save your settings and close the control panel. 4 Return to the MyCall system software, and open the Edit Configuration dialog box. Select the PC tab. Chapter 3 MyCall System Manual 5 Set alarm properties for each PC. Select a PC, and click on the Alarm Properties button. 6 Click on the Use text to speech radio button. 7 You may also make the following optional settings: Do not read tag description—This setting means that the tag description will not be annunciated during an alarm to preserve the patient’s privacy. Repeat alarm info until muted—Check to have the alarm message repeated every 20 seconds until the user mutes it by checking in the Alarm window. Alarm Filter—These checkboxes are used to determine which alarms appear on the PC. To select an alarm type, click on the checkbox to display a checkmark. You can enable all alarm types by selecting Enable all Types of Alarms. 8 Click OK to save your settings in the Alarm Properties dialog box. 9 When you have made settings for each PC that you wish to use text to speech alarms for, click on OK to exit the Edit Configuration dialog box. Muting Sounds Sound alarms will mute automatically as soon as the user clicks on any part of the Alarm window. As an option, you can also configure the software to mute alarms at all PCs on the network as soon as the Alarm window is selected on any PC. Select Mute all PC alarm sounds together in the System tab of the Edit Configuration dialog box. Initial Setup Assigning Sounds to Alarms 3-23 Startup Options The MyCall system software offers you three startup options when the Controller PC or software is started. These commands are found in the System tab of the Edit Configuration dialog box. Start Xmark as the Shell This command causes the MyCall system software to start automatically when the PC is started, and turns off the Windows Program Manager to prevent other programs from being started. Start Xmark when the PC is started This option configures the software to automatically start when the computer is turned on. This is a useful feature if a power outage occurs. The system restarts automatically and continues operation. Start LapLink when Xmark is started LapLink is the modem remote access software used by the MyCall system software and your Authorized Dealer to offer on-line customer support. This software is installed and configured when the system is commissioned. Choose this option to have LapLink start automatically when the software is started. 3-24 Chapter 3 MyCall System Manual Chapter 4 BASIC PROCEDURES CHAPTER 0 Basic procedures for the MyCall System involve the monitoring and management of people and assets protected by the system. The descriptions in this chapter are designed to illustrate the functioning of the MyCall system software. Every facility must devise specific procedures for these actions, and define the person or group responsible for carrying them out. Basic Procedures 4-1 Logging In to the Software The Login procedure is designed to restrict access to the system to authorized personnel only. Users must log in every time they use the software using this procedure. 1 Click on the Login icon in the Toolbar. The Login dialog box appears. 2 In the Name field, enter your name as set in your User Account. 3 In the Password field, enter your password. 4 Click on OK. You can now use the software. Logging in with Your Access Card If your system includes an optional access card reader, you can log in to the software using your access card. Follow these steps. Using your access card for the first time 4-2 1 Log in to the software with your user name and password, as described above. 2 Once you are logged in, the following dialog box appears. 3 Swipe your access card through the card reader to enter the data into the system. You are now logged in. Chapter 4 MyCall System Manual Using your access card thereafter To log in, simply pass your access card through the card reader. An acknowledgment like the following will appear for a few seconds. Logging Out Although the software can be configured to automatically log out a user after a period of inactivity (see page 3-14 for details), all staff should be encouraged to manually log out at the end of their session. This is easily done by clicking on the Login icon, and then clicking on the Logout button in the Login dialog box. Changing a User Password Depending on your facility’s security procedures, you may be required to change your password occasionally. Follow the procedure below: 1 From the Login dialog box, click on the Change Password button. The Change Password dialog box appears. 2 Enter your old password in the Old Password field. Then enter your new password in the New Password field and again in the Confirm new Password field. 3 Click on OK to save your new password. Basic Procedures Logging In to the Software 4-3 Checking Tag Location and Status The location and status of a tag can be checked at any time using this procedure: 1 In the Status window, right-click on the icon for the tag to display this popup menu: 2 Click on the Description of the tag; in this example, “Wheelchair.” The following dialog box appears. Status Location 3 4-4 The status of the tag is shown at the top of the dialog box, while location information is shown at the bottom. Status: This will display OK most of the time. If the tag is in alarm, the type of alarm will be displayed. Location: The location area shows the Beacon location marker most recently seen by the tag, and the LAR that most recently received the strongest signals from the tag, along with the time. RSSI indicates the strength of the signals from the tag; it is used for diagnostic purposes only. Chapter 4 MyCall System Manual Locating a Tag on the Map In an alarm, the software automatically displays the appropriate map, and the icon for the tag flashes to indicate its location. You can also quickly locate a tag on the map at any time using either of the following techniques: • Click on the entry for the tag in the Status Window to select it. The tag icon will automatically be highlighted in the Map Window. • Right-click on the icon for the tag in the Status Window, and select Show Map from the popup menu that appears. The tag icon will automatically be highlighted in the Map Window. Finding a Specific Tag The Status Window includes a Tag Display Filter to help you quickly locate a specific tag. The filter lets you select what kinds of tags will be displayed, based on the icon used to represent the person or asset. See “Adding Tags” on page 3-2 for more information on assigning icons to a tag. 1 Click on the Tag Display Filter button located in the lower left hand corner of the Status Window. The following dialog box appears: 2 By default all tag types are displayed. To deselect a tag type, click on the checkmark. You can use the All button to select all tag types, and the None button to deselect all tag types. Optional setting: Click the Show the Type Description to add a column to the Status Window displaying the tag type for each tag. 3 Click on Apply to apply the news settings. The Status Window list will be filtered, removing all unwanted tags. If you are satisfied with the results, click OK to close the dialog box. Basic Procedures Locating a Tag on the Map 4-5 Creating Tag Memos You can create a memo for any tag currently admitted into the system. This feature is useful for recording extra information about the person or asset. The contents of the memo appear automatically whenever the mouse pointer is moved over the tag in the Status window. The memo can also be quickly displayed when the tag is in alarm. Move the mouse pointer over the tag in the Alarm window, and the memo will appear automatically. To create a memo complete these steps. 4-6 1 In the Status window, right-click on the icon for the tag. From the popup menu that appears select Edit Memo. 2 In the text field, enter the contents of the memo. (You do not have to enter hard returns at the end of the line. The text will wrap automatically.) 3 Click on Save to save your memo and close the dialog box. Chapter 4 MyCall System Manual Changing a Tag’s Description Sometimes, it may be necessary to change the description for a tag. Follow the procedure below. Note 1 Double-click on the tag description to highlight it, as in this example. 2 Type in the new description. When finished, hit the return key or click on the OK button. You can also change other settings by right-clicking on the tag icon and selecting Edit Configuration from the popup menu. This opens the Tag tab of the Edit Configuration dialog box (see page 3-2 for details). This command will only appear if you have permission to access Edit Configuration. Basic Procedures Changing a Tag’s Description 4-7 4-8 Chapter 4 MyCall System Manual Chapter 5 RESPONDING TO ALARMS CHAPTER 0 The MyCall system software automatically generates alarm messages when certain events occur. In day-to-day operation, these alarms generally relate to changes in the status of tags. This chapter describes the most common alarms, and offers example response procedures. The software also generates alarms for various system events, and these are covered in the Alarm Message Quick Reference Guide on page A-1 of the Appendix. The settings for alarms are made in the Edit Configuration dialog box. Refer to page 3-2 for a complete description on how to configure alarms for tags. When an alarm occurs, the Alarm window appears on the computer display. The software continues to operate, but the Alarm window cannot be closed until the alarm has been cleared. Only authorized personnel who have logged in to the software may clear the alarm. As with the basic actions described in the previous chapter, every facility must devise specific procedures for responding to alarms, and define the person or group responsible for carrying out these procedures. Establishing and maintaining alarm response procedures is essential for the security of your system. Responding to Alarms 5-1 The Alarm Window All alarms are displayed in the Alarm window, which will appear automatically whenever an alarm occurs. The Alarm window can also be opened at any time by clicking on the Alarm button in the Toolbar. Settings Title Bar The title bar lists the total number of current alarms. Description This lists the tag or device causing the alarm. For tags, the description is the same as the one shown in the Status Window. Descriptions for other devices are taken from the settings in the Edit Configuration dialog box. Alarm Type Displays the type of alarm. See page A-1 for a complete list of all alarm types. Date Time Displays the date and time the alarm occurred. Details This text box displays more information about the alarm, including where the alarm occurred, and the most recently known location of the tag. Procedures Click on this button to display a window showing procedures for responding to alarms. These procedures must be added to the software. See page 3-8. Clear Clears the alarm from the software. 5-2 Chapter 5 MyCall System Manual Popup Menu Commands Clear Alarm Clears the selected alarm. Show Locations... Opens the Location dialog box, which shows the Beacon location marker and LAR most recently scene by the tag. See “Checking Tag Location and Status” on page 4-4 for more information. Show Picture (optional feature) Displays the picture associated with the tag. See “Assigning a Picture to a Tag” on page 3-6 for more information on this feature. Clear All Clears all current alarms. Print List Prints a list of all current alarms. Responding to Alarms The Alarm Window 5-3 Panic Alarms Panic Alarms occur when the Panic button on a MyCall Communicator tag is pressed. A message like the following appears in the Alarm window. Example Response Procedure 1 Warning 5-4 Identify the person and the location of the alarm. The location is shown in the Details box. “Current Location:” the Beacon location marker currently seen by the tag. “Alarm Location:” The Beacon location marker where the alarm occurred. “Previous Location:” If the tag is not currently seeing a Beacon location marker, the most recently seen Beacon location marker will be displayed here. “Zone:” the Zone where the alarm occurred. “Strongest LAR:” the LAR receiving the strongest signals from the tag. Due to multipath and other characteristics of RF, “Strongest LAR” may not give an accurate indication of the tag’s actual location. 2 Initiate your facility’s procedures. Specific procedures for your facility may be available in the Alarm window, as in the example above. If the window is not visible, click on the Procedures button. 3 After all security measures have been followed, click on the Clear button. This will cancel the alarm. Chapter 5 MyCall System Manual If your facility requires you to record notes on the events surrounding the alarm, the following window appears: Select a message from the “Select a message here” dropdown menu, and enter any other important information about the alarm. Click OK to save your notes. Responding to Alarms Panic Alarms 5-5 Tamper Alarms Tamper Alarms occur when a Wall Mount Tag (see page 3-4) is pressed. A message like the following appears in the Alarm window. Example Response Procedure 5-6 1 Identify the location of the alarm. The location is shown in the Details box. 2 Initiate your facility’s procedures. Specific procedures for your facility may be available in the Alarm window: click on the Procedures button. 3 After all security measures have been followed, click on the Clear button. This will cancel the alarm. If your facility requires you to record notes on the events surrounding the alarm, the Alarm Notes window will appear. Enter your notes and click OK. Chapter 5 MyCall System Manual Supervision Timeout Alarms Supervisory Timeout Alarms occur when a tag has not been seen by the system within a preset time. A message like the following appears in the Alarm window. Example Response Procedure 1 Warning Identify the tag and the location of the alarm. The location is shown in the Details box. “Previous Location:” the Beacon location marker most recently seen by the tag. “Zone:” the Zone where the tag was last seen. “Strongest LAR:” the LAR that last received the strongest signals from the tag. Due to multipath and other characteristics of RF, “Strongest LAR” may not give an accurate indication of the tag’s most recent location. 2 Initiate your facility’s procedures. Specific procedures for your facility may be available in the Alarm window; click on the Procedures button. 3 After all security measures have been followed, click on the Clear button. This will cancel the alarm. If your facility requires you to record notes on the events surrounding the alarm, the Alarm Notes window will appear. Enter your notes and click OK. Responding to Alarms Supervision Timeout Alarms 5-7 No Motion Detected Alarms No Motion Detected Alarms occur when a tag remains motionless for a preset time. A message like the following appears in the Alarm window. Example Response Procedure 1 Warning 5-8 Identify the tag and the location of the alarm. The location is shown in the Details box. “Current Location:” the Beacon location marker currently seen by the tag. “Zone:” the Zone where the alarm occurred. “Strongest LAR:” the LAR receiving the strongest signals from the tag. Due to multipath and other characteristics of RF, “Strongest LAR” may not give an accurate indication of the tag’s actual location. 2 Initiate your facility’s procedures. Specific procedures for your facility may be available in the Alarm window; click on the Procedures button. 3 After all security measures have been followed, click on the Clear button. This will cancel the alarm. If your facility requires you to record notes on the events surrounding the alarm, the Alarm Notes window will appear. Enter your notes and click OK. Chapter 5 MyCall System Manual Tag Location Changed Alarms These alarms occur when a tag has changed locations. A message like the following appears in the Alarm window. Example Response Procedure 1 Warning Identify the tag and the location of the alarm. The location is shown in the Details box. “Current Location:” the Beacon location marker or LAR most recently seen by the tag. “FROM... TO:... :” Shows the Beacon location marker where the tag originally was, and where it has moved to. “Zone:” the Zone where the alarm occurred. “Strongest LAR:” the LAR receiving the strongest signals from the tag. Due to multipath and other characteristics of RF, “Strongest LAR” may not give an accurate indication of the tag’s actual location. 2 Initiate your facility’s procedures. Specific procedures for your facility may be available in the Alarm window; click on the Procedures button. 3 After all security measures have been followed, click on the Clear button. This will cancel the alarm. If your facility requires you to record notes on the events surrounding the alarm, the Alarm Notes window will appear. Enter your notes and click OK. Responding to Alarms Tag Location Changed Alarms 5-9 Low Battery Alarms When the battery power in a tag falls below a certain threshold, a Low Battery Alarm is automatically generated in the Alarm window. Example Response Procedure 5-10 1 Identify the tag with the low battery. The tag continues to function for a period even with a low battery. 2 Contact your System Administrator, and arrange to have the battery replaced. 3 Click on the Clear button in the Alarm window. If your facility requires you to record notes on the events surrounding the alarm, the Alarm Notes window will appear. Enter your notes and click OK. Chapter 5 MyCall System Manual Chapter 6 INSTALLING AND CONFIGURING DEVICES CHAPTER 0 This chapter explains how to configure the various devices that make up the system, such as LARs, Beacon location markers and PCs. This information is offered for reference only, as your system will have been installed and configured by your Authorized Dealer. If you have any questions about installing devices or setting up the system, please consult your Dealer or VeriChip. A complete discussion of these issues is also contained in the MyCall Installation Manual (p/n 805I0401). Installing and Configuring Devices 6-1 LonWorks Device Settings This section describes how to configure LARs and I/O Modules. Running Install LonWorks Devices The Install LonWorks Devices command is used to add LonWorks devices to the MyCall system software after they are physically installed. Complete the following steps: 6-2 1 Power up all LARs and I/O Modules. Open the MyCall system software. 2 From the Xmark menu, select the Install LonWorks Devices command. The LonWorks Device Installation dialog box appears: 3 Click on the Auto Configure button. This command searches the LonWorks network for all unconfigured devices and then configures each for operation. 4 Confirm that configuration was successful. A summary message box appears once all devices have been configured. Click on OK. Another message box appears with detailed results of the Auto Configuration session, which may be saved for future reference. Check the results to make sure that all devices have installed. Devices are identified by Chapter 6 MyCall System Manual their LonWorks ID numbers. If any device does not appear, check to make sure that it is physically installed properly, and then run Auto Configure again. 5 A New LAR alarm appears if installing LARs. The alarm warns you that RSSI settings have been set for one or a number of LARs. Click Clear to close the Alarm window, and then proceed to coverage testing (see page 8-13). Local Area Receiver Setup Once LARs are installed into the MyCall system software, you are ready to configure their operation in the Edit Configuration dialog box. You require the installation maps used during the LAR installation showing the unique Neuron ID for each LAR along with its location. 1 Open the Edit Configuration dialog box and select the Receiver tab. 2 Enter a description for each Local Area Receiver. Select a LAR in the list window, matching the LAR Neuron ID written on the facility map during installation to the LAR Neuron ID appearing in the list. Enter a description (name) for the LAR in the Description field. Descriptions can be alphanumeric up to sixty characters in length. Generally, names indicate the installed location of the LAR. Installing and Configuring Devices LonWorks Device Settings 6-3 3 Make settings under Event Configuration. There is a single configurable alarm for LARs: High Ambient Noise Alarms. These occur when the average noise around the LAR has exceeded the RSSI threshold (see below for more information on RSSI). High Ambient Noise Alarms are automatically logged to the database, and you can also choose to have alarms appear in the Alarm window by checking the Generate Alarm checkbox. 4 Save the settings. Click the Apply button to save the settings for the selected LAR. 5 Repeat the above steps for each LAR, and then click on the OK button to close the dialog box. Setting RSSI Thresholds Each LAR has an adjustable RSSI (Received Signal Strength Indicator) Threshold that sets a minimum power level that tag signals must exceed in order to be relayed on the LonWorks network. This is necessary to avoid interference from radio noise sources in the vicinity of the LAR. Ideally, the Threshold is set just above the noise level in the installed location. This provides the best possible coverage while also reducing the likelihood of High Ambient Noise alarms. The MyCall system software sets the RSSI Threshold when the LAR is configured, based on a single sample of the ambient noise. However, the Threshold should be optimized using the procedure below, which bases the Threshold on multiple RSSI noise readings recorded by the software (every 30 minutes). 6-4 1 Leave the system operating for a minimum of three days. (Be aware that noise levels can vary between weekend days and weekdays.) 2 At the end of the test period, generate a Receiver Stats report. Chapter 6 MyCall System Manual 3 1 Click on the Reports icon in the Toolbar to open the Reports window. 2 Select Other Reports in the report types list, and then click on the LAR Statistics report to highlight it. 3 Make sure that the Database dropdown menu points to the active database (usually called “Xmark”). Then enter the Start Time and End Time for the report. This should coincide with the test period. 4 Click Run to generate the report. Sort the report by LAR name, by clicking on the Description column, as shown below: Find the highest average RSSI for each LAR. The report lists the average RSSI for both antennas (single-antenna LARs Installing and Configuring Devices LonWorks Device Settings 6-5 show data only under the AveRSSI1 column). Find the highest reading from either antenna recorded during the test period. 4 5 6-6 Set the RSSI Threshold for each LAR. Set the RSSI Threshold 25 counts above the highest average RSSI recorded for the LAR, and no less than 80 counts for dual-antenna LARs or 85 counts for single-antenna LARs. 1 Open the LonWorks Device Installation dialog box. 2 Select the LAR in the Device Status window, and enter the new Threshold in the RSSI field. Click the Update button to send the new value to the LAR. Repeat this procedure for each LAR. 3 When the RSSI Threshold for each LAR has been updated, click the Close button to exit the LonWorks Device Installation dialog box. A Coverage Changed Alarm will appear if the Threshold was raised for any LAR. Proceed to coverage testing. See page 8-13 for details. Chapter 6 MyCall System Manual I/O Module Setup I/O Modules must be configured after installation to program both inputs and outputs. Configuring I/O Modules Each I/O Module must be configured in the Edit Configuration dialog box to assign it a name and setup alarm responses. You will need to know the Neuron ID for each I/O Module along with its installed location. To configure I/O Modules, follow the procedure below: 1 Open the Edit Configuration dialog box and select the I/O tab. 2 Enter a description for each I/O Module. Select an I/O Module in the list window, and then enter a description in the Name field. Descriptions can be alphanumeric up to sixty characters in length. The name of the actual Module is not particularly important. When an alarm or event occurs, it is the information entered for the I/O Module input that is displayed in the Alarm window and on facility maps. I/O inputs are configured below. 3 Save the settings. Click the Apply button to save the settings for the selected I/O Module. Installing and Configuring Devices LonWorks Device Settings 6-7 Then proceed to configure the inputs and outputs for the Module, as described below. Configuring Inputs 6-8 1 To configure input settings, double-click on an I/O Module to display the input and output points, and then click on an input (open door icon) to display the following dialog box. 2 Enter a description for the input device in the Name field. Descriptions can be alphanumeric up to sixty characters in length. This is the name that appears on facility maps and elsewhere. Use a name that describes the input’s function. For example, an input connected to door contacts at the East Wing emergency exit might be named “East Wing Exit.” 3 Add the input to a Zone (optional). If the facility uses Zones, add the input to the Zone where it is physically installed. 4 Make settings under Event Configuration. The MyCall system software responds to inputs according to options chosen in this section. Each option can be configured to log information to a database, generate an alarm, or activate a pager system (if installed). Some options may be set to on and cannot be changed. Chapter 6 MyCall System Manual To configure alarms, click on any or all of the Log to the Archive Database, Generate Alarm or Send Page checkboxes. You must click on at least one of these choices to enable a response. a) Input Closed—Choose to initiate system response when the Input closes. (Open is therefore the default state.) b) Input Open—Choose to initiate system response when the Input opens. (Closed is therefore the default state.) c) Auto Cancel—This command instructs the input to automatically turn off all outputs when it returns to its default state. For example, an input connected to door contacts can be used to control an output connected to a camera. When the door opens, the camera turns on. When the door closes, the camera will automatically turn off. Note that Auto Cancel will not clear the alarm in the Alarm window. d) Allow Multiple Alarms—Check this box to have multiple alarms appear in the Alarm window for the same input. If this box is unchecked, the alarm message will appear once and remain until the alarm condition is cleared. e) Send Page—Choose this command to have the alarm condition activate the pager system. This option only appears if a pager system is installed and configured. f) Sound—Assign a sound to be played when an alarm occurs (optional). Refer to “Assigning Sounds to Alarms” on page 3-16 for more information. g) Alarm Type Description—Enter the description for the alarm. This description appears in the Alarm window. Use a description that describes the alarm. For door contacts configured to alarm when open, you might use a description such as “East Wing Exit open.” h) Time From:, Time To:—This option configures the input to operate for a specific time period during the day. For example, enter 4:00 PM in Time From and 6:00 AM in To. The device will operate from 4:00 in the afternoon to 6:00 in the morning. 5 Save the settings. Click the Apply button to save the settings for the selected input. Repeat the same procedure for all inputs. By default, the dialog box displays four outputs and four inputs for every I/O Module. To turn an output into an input, simply select an output in the list window, and click on the Input radial button. Installing and Configuring Devices LonWorks Device Settings 6-9 Configuring Outputs 6-10 1 To configure output settings, double-click on an I/O Module to display the input and output points, and then click on an output (light bulb icon) to display the following dialog box. 2 Enter a description for the output device in the Name field. Descriptions can be alphanumeric up to sixty characters in length. This description appears on the map and when editing an I/O Module’s settings. Use a name that describes the nature of the output device. For example, an output connected to a camera might be named “Camera East Wing.” 3 Add the output to a Zone (optional). If the facility uses Zones, set the Zone configuration for the output. If, for example, you have one wing of a facility designated as Zone 1, you could choose to have the outputs in that Zone only activate when an alarm or event occurs in the same Zone. In this way, the outputs can be directed only to personnel responsible for that part of the building. You could also, however, choose to have an Alarm in any Zone activate the output, by selecting All Zones. This option will only appear if Zones have been configured under the System tab. (See Creating Zones on page 7-5.) 4 Select alarms to activate the output. Within the Event Configuration section, choose what types of alarms will Chapter 6 MyCall System Manual activate the output. To choose an option, click on the checkbox to display a checkmark. a) Tag Tamper Alarm—The output is activated when a Wall Mounted Tag is pressed. b) Tag Panic Alarm—The output is activated when a MyCall Communicator tag Panic Alarm occurs. c) Tag Supervisory Timeout Alarm—The output is activated when a Supervisory Timeout alarm occurs. d) Tag No Motion Timeout Alarm—The output is activated when a tag No Motion Timeout alarm occurs. e) Battery Alarm—The output is activated when a low battery alarm for a tag occurs. f) Beacon Tamper Alarm—The output is activated when a Beacon Tamper Alarm occurs. g) Beacon Low Battery Alarm—The output is activated when a low battery alarm for a Beacon location marker occurs. h) Single I/O Alarm—The output is activated when an alarm is received from only one input. i) Multiple I/O Alarm—The output is activated only when an alarm is received from more than one input. j) Lonworks Nodes Communication Failure Alarm—The output is activated when there is a communication failure in the LonWorks network. k) All Other Alarm Types—The output is activated when any alarm not appearing within this list occurs. These include communication failure alarms from LARs and other devices. 5 Set the time period during which the output will be continually engaged (optional). You may want to set a time period during which the output is continually engaged, for example to activate a magnetic door lock during nighttime hours. Set the start time in Time From and the stop time in Time To. During other times of the day, the output will only engage when the programmed alarms or events occur. 6 Save the settings. Click the Apply button to save the settings for the selected output. Repeat the same procedure for all outputs. By default, the dialog box displays four outputs and four inputs for every I/O Module. To turn an input into an output, simply select an input in the list window, and click on the Output radial button. 7 Once settings for all I/O Modules are complete, click on the OK button to close the Edit Configuration dialog box. Installing and Configuring Devices LonWorks Device Settings 6-11 Adding Beacon Location Markers Beacon location markers may be added to the software either one at a time or as a group with identical settings. Enrolling Beacon Location Markers One at a Time 6-12 1 Open the Edit Configuration dialog box and select the Beacon tab. 2 Click the New button. 3 Enter the Beacon location marker’s identification number in the ID filed. Each Beacon location marker has an identification number located on its printed circuit board. Refer to your facility map indicating the location of each Beacon location marker along with its ID number. 4 Enter a Description (name) for the Beacon location marker. Descriptions can be alphanumeric up to sixty characters in length. This description appears on facility maps when editing a Beacon location marker's settings. Consult with facility staff to choose a name that will be meaningful to the users of the system. For example, name the Beacon location marker after the room in which it is located. 5 Add the Beacon location marker to a Zone (optional). This setting only appears if Zones have been created under the System tab. Chapter 6 MyCall System Manual Select the Zone where the Beacon location marker is located from the dropdown list. 6 Enable Tag “No Motion Timeout” alarm (optional). This setting permits the no motion time-out alarm for tags on a per Beacon location marker basis. With this feature, tags entering the Beacon location marker’s illumination pattern cause an alarm if they remain stationary for the duration of the set timeout period. Tags initiating this alarm must be individually configured under the Tag tab of the Edit Configuration dialog box (see page 3-3). 7 Make settings under Event Configuration. Beacon location markers can be configured for a Supervisory Timeout alarm. This requires that a tag be permanently installed close to the Beacon location marker. The Controller PC monitors the Beacon location marker’s transmissions relayed through the tag. If these transmissions stop an alarm can be configured to occur. a) Log to the Archive Database Click on this checkbox to log alarms to the database. b) Generate Alarm To generate an alarm, click on the checkbox to display a checkmark. If you do not require alarms, click on the checkbox to remove the checkmark. c) Auto Clear Choose this command to clear alarms automatically. The alarm clears when the condition causing the alarm ends. d) Send Page If a pager system is installed, you can choose to have a page sent when a Supervisory Timeout Alarm occurs. Click on the checkbox to display a checkmark. e) Timeout Enter a time period for the Supervisory Timeout. The system delays sounding an alarm until this time period elapses. The recommended minimum timeout is two minutes. The maximum is 365 days. Set the time period to match the supervision level required. f) Apply to All Use this command to apply the same alarm settings to all Beacon location markers. Make the desired settings for any Beacon location marker, and then click on this button. 8 Save the settings. Click the Apply button to save the settings for the subject Beacon location marker. Installing and Configuring Devices Adding Beacon Location Markers 6-13 9 Click the New button to add another Beacon location marker. Repeat the above steps for each additional Beacon location marker. 10 Click the OK button to close the Edit Configuration dialog box. Enrolling Several Beacon Location Markers at Once You can also enroll several Beacon location markers at one time, provided that their ID numbers are in sequential order. All the Beacon location markers will have identical settings. 6-14 1 In the Beacon tab, select a Beacon location marker that you would like to use as the model. This Beacon location marker’s settings will be applied to all the Beacon location markers added. 2 Click on the New ± button. 3 Enter the First New ID of the series of Beacon location markers being added. 4 Enter the Last New ID of the series. 5 Choose a Description. Click on the Describe as the current record checkbox to add the entire group of Beacon location markers with the same description as the Beacon location marker displayed as the Current Record. If you do not choose this setting, descriptions default to Beacon XX, with XX being each Beacon location marker’s ID number. 6 Choose an Alarm Configuration. Click on the Alarm Configuration as the current record checkbox to add the entire group of Beacon location markers with the same alarm configuration as the Beacon location marker displayed as the Current Record. If you do not check this setting, Beacon location markers in this group will have no alarm configuration. Chapter 6 MyCall System Manual 7 Click OK. The new Beacon location markers will appear in the window list. You may wish to change the description or other settings for some or all Beacon location markers. Follow the procedure for adding a single Beacon location marker described above. Changing PC Alarm Properties You can configure what kind of alarms are displayed on each PC in the system. Alarm settings for both the Controller and Clients are made from the Controller. 1 Open the Edit Configuration dialog box and select the PC tab: 2 Select the PC you wish to configure by clicking on it in the list window. 3 Assign the PC to a Zone (optional). If the facility uses Zones, add each PC to the Zone where it is physically located. 4 Select which Zones the PC will display alarms from under Monitored Zones. The PC will only display alarms that occur in the specified Zones. The All Zones setting results in all alarms being displayed. Installing and Configuring Devices Changing PC Alarm Properties 6-15 Note As a precaution, it is recommended that at least one PC be kept to All Zones. This ensures that all alarms will be displayed on at least one PC. 5 Note Make Event Configuration settings for each Client PC. With the Supervisory Timeout alarm activated, the Controller PC monitors the Client PC. If communication with the client is lost, an alarm is generated. This information can also be saved to the database. Client PCs cannot generate a Supervisory Timeout alarm for the Controller PC. If network communication is lost, the Client PC disconnects from the network, and all information in the Map and Status windows disappears. If this occurs, you should immediately check the Controller PC. Event Configuration has the following settings: a) Log to the Archive Database Click on this checkbox to log alarms to the database. You can use this data to create system activity reports within the MyCall system software. b) Generate Alarm Alarms appear in the software and must be cleared by the operator. To generate an alarm, click on the checkbox to display a checkmark. c) Auto Clear Choose this command to clear alarms automatically. The alarm clears when the condition causing the alarm ends. Alarms still log to the archive database, if required. d) Send Page If a pager system is installed, you can choose to have a page sent when a Supervisory Timeout Alarm occurs. Click on the checkbox to display a checkmark. e) Timeout Enter a time period for the Supervisory Timeout. The MyCall system software delays sounding an alarm until this time period elapses. Supervision timeouts range from 20 seconds to 365 days. Apply to All Use this command to apply the same alarm settings to all Client PCs. Make the desired settings for any PC, and then click on this button. 6 6-16 Determine which alarms will appear on the Controller and each Client. Select a PC in the list window, and then click on the Alarm Props button to Chapter 6 MyCall System Manual open the following dialog box. Popup the alarm window—This setting automatically pops up the Alarm window in front of all other open windows when alarms occur. Do not use sounds—Select to turn off sound alarms for the PC. Use prerecorded sounds—Select this option to have a recorded sound played when alarms occurs. See “Setting Generic Alarm Sounds” on page 3-18 for more information. Use location specific sounds—Check this box if you are using prerecorded sound files that are associated with each Exciter. See “Using Pre-Recorded Messages” on page 3-20 for more information. Use text to speech—Select this option to activate text to speech alarm sounds. See “Using a Text-to-Speech Engine” on page 3-21 for more information. Do not read tag descriptions—This setting means that the tag description will not be annunciated during an alarm to preserve the patient’s privacy. Repeat alarm info until muted—Select this option to continuously sound an audible alarm tone when alarms occur. (This can be muted by clicking on the Alarm window.) Pop up picture window—Check this setting to have the image viewer window appear automatically when an alarm occurs for a tag with an image file assigned to it (see “Assigning a Picture to a Tag” on page 3-6). Alarm Filter for this PC—These checkboxes are used to determine which alarms appear in the Alarm window. To select an alarm type, click on the checkbox to display a checkmark. You can enable all alarm types by selecting Enable all Types of Alarms. Installing and Configuring Devices Changing PC Alarm Properties 6-17 a) Tag Alarms—Supervisory Timeout, No Motion Timeout, Tamper Button Active, Panic Button Active, and Low Battery b) Hugs Tag Alarms—For use with the Hugs application only. c) Receiver Alarms —Supervisory Timeout, High Ambient Noise, and Coverage Changed. d) Beacon Alarms—Supervisory Timeout, Low Battery. e) Exciter Alarms —For use with the Hugs application only. f) IO Alarms—Input Closed, Input Open. g) PC Alarms—Supervisory Timeout. h) Lonworks device communication failure. i) All Other Type Alarms. 5 Click OK to save your settings. Configuring a Pager System The MyCall system supports pagers using the Telocator Alphanumeric Protocol (TAP) and the COMP1 protocol. When an alarm occurs, the Controller PC automatically sends out page messages indicating the nature and time of the alarm. In addition, pages can be entered manually and sent at any time. Once the pager has been installed and configured, alarms for tags and devices must also be configured in the Edit Configuration dialog box to active the pager system. Pager System Setup The pager system connects to the Controller PC to send page messages automatically to remote pagers when certain alarms occur. To connect and use a pager system, complete the following steps: Step 1: Connect the pager to the Controller PC Connect the pager system to the Controller PC and configure the device according to the instructions accompanying the product. Note 6-18 Remote pagers must be separated from the pager interface connected to the Controller PC by a distance of at least 15 ft. (4.5 m) for proper operation. Chapter 6 MyCall System Manual Step 2: Configure the MyCall system software 1 Open the Edit Configuration dialog box and select the Pager tab. 2 Click on the Device Type dropdown list and choose the kind of pager system. For a COMP1 system, select either the Motorola or Visiplex option (the functionality is the same). 3 Under Repeat Each Alarm Message, select how many times the Controller PC sends a page message. Choose from 1 to 10 repetitions. 4 Make Serial Port settings. Note 1 Com Port: Select the serial port on the Controller PC that is connected to the pager system. 2 Baud: The baud rate sets the speed of communications between the Controller PC and the pager system. Baud rates on the Controller PC must be set to the same rate chosen on the device. Available Baud rates are 300, 1200, 2400, 9600, and 19,200 bits per second (bps). 3 Data Bits: Set this value to the same on both the Controller PC and the pager system. Data Bits can be set to either seven or eight. 4 Parity: Set the same value on both the Controller PC and the pager system. Parity values include None, Odd, or Even. Installing and Configuring Devices Configuring a Pager System 6-19 5 Make optional settings. 1 Notify on clear alarm event: Select this command to have a message automatically sent informing staff that an alarm has been cleared. Only staff members who received the original alarm message will receive the alarm cleared message. 2 Alarm communication error (TAP only): Check this box to have the software generate an alarm message when the system fails to send a page message. Alarms are automatically generated for COMP1 systems. 3 Log page messages (TAP only): This command causes all page messages to be recorded to the database. 4 Telephone Line Setup (TAP modem systems only): For TAP pager systems connected to the Controller PC over a modem, select the kind of modem, and enter the phone number of the pager system. 6 Click Apply to save the settings. 7 For TAP systems only, enter the pager ID number for each user in their User Account. See page 3-13 for details. Step 3: Configure tags and devices to send pages In the Edit Configuration dialog box, configure tags and devices to send out pages when alarms or events occur. Pages can be generated for all alarm types. Follow the procedure below: 1 Open the Edit Configuration dialog box and click on the appropriate device tab. 2 Select a device in the list window, and then click on an alarm type in the Alarm Configuration window. Check the Send Page checkbox to display a checkmark. A page will now be sent whenever an alarm of that type occurs for that device. Repeat this procedure for all alarm types. 3 Repeat steps 1 and 2 for all devices for which you wish to have a page sent when alarms occur. Remember, the alarm settings for several devices can be configured at the same time using the Apply to All command. Configure one device, and then click Apply to All. Step 4: Test the installation Send a manual page to make sure that the MyCall system software and the pager system are communicating properly. Click on the Send Page button in the Toolbar, and type in a short page message. Click on OK to send the page. Make sure that all staff members carrying pagers receive the message. 6-20 Chapter 6 MyCall System Manual Page Message Format Page messages have the format Alarm Type, Alarm Location, Tag Description, Date/Time. For example, a page indicating a Tamper Alarm in a facility’s ER area would look like the following: Tag Tamper ER IV Pump Wednesday, May 21, 2003 Note The Date/Time format in the Controller PC may differ from the example above depending upon the format chosen within the Regional Options found in the Windows Control Panel dialog box. Sending Manual Pages You can send a page message at any time to all staff members carrying pagers. Simply click on the Send Page icon in the Toolbar, or select Send Page from the Xmark menu. Enter your message and click on OK to send it. Installing and Configuring Devices Configuring a Pager System 6-21 6-22 Chapter 6 MyCall System Manual Chapter 7 MAPS, ICONS AND ZONES CHAPTER 0 This chapter covers how to install maps onto the Controller and Client PCs, add icons to maps, and create Zones. This information is offered for reference only, as these settings will have been completed by your Authorized Dealer. Maps, Icons and Zones 7-1 Adding Facility Maps Maps are used to represent the area covered by the system. Depending on the size of the facility, more than one map may be required to provide an appropriate level of detail. (Icons for a single device can be added to more than one map.) When an alarm occurs, the software will automatically display the appropriate map, and show the location of the tag in alarm. Maps must be in the graphical bitmap (.bmp) form, and can be either color or gray scale. For consistent colors across several computers, choose the same number of display colors within each computer. Maps for the MyCall system software may be obtained from different sources. A very useful method is to obtain a building’s architectural drawings in computer format. These files can be converted to bitmap form using a number of drawing packages including AutoCAD® and CorelDRAW®. An alternative method is to have architectural drawings electronically scanned and saved as bitmap files. A final choice for creating maps is to draw the required floor plan using a drawing package and save the file as a bitmap. When creating the map, leave a one inch (2.5 cm) white border. This border provides an area for icon messages to display when located at the edge of the map. To add facility maps, follow the procedure below: 1 7-2 Open the Edit Configuration dialog box and select the Map tab. Chapter 7 MyCall System Manual Note 2 Click on the New button, and enter a description (name) for the new map in the Description field. For example, name the map after the floor it represents. 3 Click on the Browse button, and navigate through your directories to find the file you wish to use as the new map. 4 Click on the Apply button. The new map appears in the Preview Window. 5 Click on OK to save your settings and exit the Edit Configuration dialog box. 6 In the software main window, you can now select the new map from the Map dropdown list, and add icons for the various system devices. Copy all map files to exactly the same location on each Client PC as on the Controller PC. By default, this is the Xmark directory on the C:\ drive. Adding Icons to Maps Icons for system devices such as Beacon location markers, LARs, I/O Modules and PCs are added to maps after the devices are installed and configured. The position of the icon on the map must correspond as closely as possible to the actual location of the device. To add one or several icons for any kind of device, follow the procedure below. 1 Right-click the mouse anywhere on the map to display the following popup menu. Maps, Icons and Zones Adding Facility Maps 7-3 7-4 2 Select Add Icons to open the Add Icons dialog box. Click on the Icon Properties button. 3 Click on the tab for the type of device you want to add (the example above shows the Beacon location marker tab). 4 Configure Icon Properties. (Your settings will be applied automatically to every device.) To have the icon always appear on the map, check the Always show the icon checkbox to display a checkmark. If this selection is not made, the icon can be hidden using the Show Icons command. Under Description Display, choose whether and when to display the description for the device. The description appears under the icon on the map. You can choose to never show this description, always show the description, or only display the description when tags appear in the vicinity. 5 Click and drag one or more icons to the map. Click on the device of interest and drag the icon to the map. To add more than one icon, hold down the Control key when selecting devices. You can also choose the Select All command to add all the devices at once. 6 Once an icon is on the map, you can reposition it by double-clicking on it and dragging it to the desired location. You can also customize properties for the icon by right-clicking on it and selecting Icon Properties. Chapter 7 MyCall System Manual Creating Zones Zones are a way of dividing the area covered by the MyCall system into sections, and customizing the system alarm responses in each section to better match your security requirements. The benefit is that users in one area only see alarms that occur in their section. How Zones work Each Beacon location marker in the system is assigned to a Zone. Every time the tag sees a Beacon location marker, the Zone information is updated automatically. In this way, the system always knows which tag is in which Zone. PCs are also assigned to Zones. An alarm will only be displayed at a PC if it occurs in the same Zone. Staff at that PC receive immediate notification of the alarm, while staff in other areas is not disturbed. Proper Zone configuration Keep the following points in mind when setting up Zones. Consult with your Authorized Dealer before implementing Zones. • Install Beacon location markers near the border between Zones. It is very important that a tag passes by a Beacon location marker when it changes Zones. If this doesn’t happen, alarms for that tag might be directed to the wrong PC. Beacon location markers should be installed near the border in both Zones so that tags moving in either direction will pass by a Beacon location marker soon after changing Zones. • Keep one PC set to display all alarms. As a precaution, it is recommended that at least one PC be set to All Zones. This setting causes all alarms to be displayed on the PC, no matter where they occur. All Zones is the default Zone setting for PCs. To create Zones, follow the procedure below: Maps, Icons and Zones Creating Zones 7-5 7-6 1 Open the Edit Configuration dialog box and select the System tab. 2 Under Zones, click on the New button, and enter a description (name) for the new Zone. Use a description that indicates the physical extent of the Zone. For example, call a Zone on the eighth floor of a facility “8th Floor.” 3 Assign the Default Zone. Select the Zone you would like to make the default, and click on this button. All Beacon location markers (and I/O Modules if used) not otherwise assigned to a Zone are automatically assigned to the default Zone. 4 Click on the Apply button to save your settings. Chapter 7 MyCall System Manual New Feature 5 Click on the PC tab. 6 Assign each PC to a Zone. Add each PC to the Zone where it is physically located. 7 Select which Zones the PC will display alarms from under Monitored Zones. The PC will only display alarms that occur in the specified Zones. The All Zones setting results in all alarms being displayed. 8 Click on the Apply button to save your settings. 9 You must now assign each Beacon location marker (and I/O Module if used) to a Zone. See the sections for each type of device for more information. Maps, Icons and Zones Creating Zones 7-7 7-8 Chapter 7 MyCall System Manual Chapter 8 REPORTS, DIAGNOSTICS AND MAINTENANCE CHAPTER 0 The MyCall system software contains a number of tools for gathering, viewing and analyzing the data generated by the system. This chapter reviews the various reporting and diagnostic options, as well as the regular maintenance required by the system. Reports, Diagnostics and Maintenance 8-1 Viewing LAR Statistics You can call up detailed information on any LAR, by right-clicking on a LAR icon in the Map window and selecting LAR Stats. The feature is especially useful for viewing RSSI values, and other technical details, for diagnostic purposes. The most recent data for the LAR is displayed. 8-2 Chapter 8 MyCall System Manual Generating Reports The MyCall system software can generate a range of reports based on the system activity data stored in the database. To generate a report, complete these steps. 1 Click on the Reports icon in the Toolbar, or open the Xmark menu and choose the Reports command. 2 Select the report type from the drop-down menu on the left-hand side of the Reports window. 3 The reports for your selection appear in the window below the dropdown menu. Select the report you wish to run. 4 In the Database dropdown menu, select to view reports from the active database (usually called “Xmark”), or the backup database (“XmarkBackup”). 5 Optional settings For certain types of reports, the following settings may also be made: 1 Select the date range for the report by clicking the calendar icons to select the Start Time and End Time. 2 For some kinds of reports, like those for tags, you can also enter the ID number in the ID field. The report will only show information for that particular tag or device. Reports, Diagnostics and Maintenance Generating Reports 8-3 3 Select Report or Summary. Alarm and certain other reports give you the option of a full report or a summary that shows how many alarms occurred within certain periods of time. Select the time span (hours, days, weeks, months) in the Time Span menu. 6 Click Run to generate the report. The report appears in the software, and can be printed. First click on the Printer Ready button in the upper right hand corner. This formats the report for printing. Then click on the Print icon on the toolbar. (See page 2-10 for more information on printing.) Note The software automatically closes all open report windows at 2:00 AM. This is to prevent screen clutter. Report Types Reports are grouped into types, as explained below. Alarm Reports—This group of reports concerns device and system alarms for each type of device in the system. Alarm Notes—The notes recorded by users when an alarm was cleared. The “Ask for note on clearing the alarm” feature must be active to generate this report (see page 3-9). All Alarm & Event Records—Lists the history of all alarms and events, including when they occurred and when they were cleared. All Alarms—Lists all alarms that have occurred in the system. All Events—Lists all events that have occurred in the system. Beacon Alarms—Alarms recorded for Beacon location markers. Exciter Alarms—For the Hugs application only. HA Noise Alarms—High Ambient Noise Alarms recorded for Local Area Receivers. Hugs Tag Alarms—For the Hugs application only. I/O Alarms—Alarms recorded for I/O Modules. I/O Channel Alarms—Alarms associated with the inputs and outputs of I/O Modules. Kisses Alarms—For the Hugs application only. LAR Alarms—Alarms recorded for Local Area Receivers. LonWorks Network Alarms—Alarms associated with the LonWorks network. PC Alarms—Alarms recorded for PCs, such as Maximum Login Attempts Exceeded alarms. System Alarms—System information, such as when the MyCall system software was started and shutdown, and login information. 8-4 Chapter 8 MyCall System Manual New Feature Tag Alarms—Alarms recorded for tags. Configuration History—These reports detail changes made to configuration settings for each device within the system. Summary reports are not available for this group. All Configuration Records—Complete configuration history for the system. Beacon Configuration—Configuration history of all Beacon location markers in the system. Exciter Configuration—For the Hugs application only. Hugs Tag Configuration—For the Hugs application only. IO Configuration—Configuration history of all I/O Module in the system. Map Configuration—Configuration history of all I/O Module in the system. MyCall Tag Configuration—Configuration history of all tags in the system. Pager Configuration—Configuration history of all pagers in the system. PC Configuration—Configuration history of all PCs in the system. Receiver Configuration—Configuration history of all LARs in the system. System Configuration—Configuration history for settings made in the System tab of the Edit Configuration dialog box, including Zone and sound settings. User Configuration—Generates a list of users of the software, based on the user accounts created in the User tab of the Edit Configuration dialog box (see page 3-10). Exciter Reports—For the Hugs application only. Hugs Tags Reports—For the Hugs application only. Other Reports—Miscellaneous reports on system activity. All Log Records—Generates a report of all system activity. Depending on the date range you set, this could be a very large report. BabySense and Worn Strap Records—For the Hugs application only. LAR Statistics—This creates a report containing technical information on all LARs. Tag Messages—This report lists priority messages, such as Tamper messages. The Log Priority Tag Messages command must be selected in the System tab of the Edit Configuration dialog box to enable this report. System Configuration—This group gives summary information on the current configuration on the selected device type. Beacons—Current configuration of all Beacon location markers. CCTV Servers—For the Hugs application only. Reports, Diagnostics and Maintenance Generating Reports 8-5 New Feature Device Configuration—Current configuration of all LARs and I/O Modules in the system. Exciters—For the Hugs application only. Hugs Tags—For the Hugs application only. IO Modules—Current configuration of all I/O Modules. Kisses Tags—For the Hugs application only. LARs—Current configuration of all LARs. Maps—Lists all maps in the system. PCs—Current configuration of all PCs. Settings—This report provides a condensed profile of your system, including such information as the tag limit granted by you license and a summary of alarms received. Tags—Current configuration of all tags. User Groups—Timeout and password expiry settings for all user groups. Users—The user name and full name of all users in the system, along with the password expiry setting. Tag Reports—There is a single report under this group. The Tag Movement report provides a history of movement of tags. New Feature Using the Charts Feature The Reports window enables you to create charts for summary reports. This is a useful way to present information in a graphical format for easier understanding. Follow this procedure to display a chart. Note 8-6 The charts are generated using the Microsoft Office Web Components of the Microsoft Office XP suite of products. Chart functions are enabled when any Microsoft Office XP product (Word, Excel, etc.) is installed on the PC acting as the Reports server (usually your Controller PC). Alternatively, the Microsoft Office Web Components may be downloaded for free at the Microsoft web site: http:// www.microsoft.com/downloads/details.aspx?FamilyID=982b0359-0a86-4fb2a7ee-5f3a499515dd&displaylang=en. Be sure to reboot the PC after installing the components. Ask your Dealer for assistance with this procedure. 1 Select the report type from the drop-down menu on the left-hand side of the Reports window. 2 The reports for your selection appear in the window below the dropdown menu. Select the report you wish to run. 3 Click on the Summary radio button, and the Charts checkbox. Chapter 8 MyCall System Manual 4 In the Database dropdown menu, select to view reports from the active database (usually called “Xmark”), or the backup database (“XmarkBackup”). 5 Click Run to generate the report. 6 You can select what kind of chart to display from the dropdown menu to the upper right of the chart. Choose from Bar Horizontal, Bar Horizontal 3D, Bar Vertical, Bar Vertical 3D, Doughnut, Doughnut Exploded, Pie, Pie 3D, Pie Exploded and Pie Exploded 3D. To save the chart to copy into another program, right-click on it and select Save Picture As... from the popup menu that appears. Creating Custom Reports The software supports custom reports for any data stored in the database. A knowledge of SQL is required to create custom reports. Note The default reports cannot be copied over or deleted. If you wish to modify a default report, create a variant using the procedure below. 1 In the Reports window, select any report, and then click on the Advanced checkbox. If you wish to make a variant of an existing report, select that report as your model. 2 In the text box, create your report. You can view your report by clicking on Run SQL. (To return to the editing screen from the report, right-click in the Report window, and select Back.) If you need to revert to the original SQL statement, click on Get SQL. All your changes will be lost. Reports, Diagnostics and Maintenance Generating Reports 8-7 3 Save your report by clicking on the Save as Report button to open the following dialog box. 4 Select the group to store the report in under Report Group, then assign a name to the report under Report Name. Click Save to return to the Reports window. The new report can now by run from the Reports window. Deleting a Custom Report To delete a custom report, select it in the list window, click on the Advanced checkbox, and then click on Delete. The default system reports cannot be deleted. Viewing Reports Remotely You can access the Reports window not just on the PCs of the MyCall system, but any PC that has access to the Reports engine. You will require Internet Explorer version 5.5 or higher to display reports. Note By default, report data transmitted to a remote computer using the method described here is not encrypted. Data encryption is possible by activating the Secure Socket Layer (SSL) for Xmark Reports on the PC that contains the Reports engine. This PC must be running the Windows Server operating system. 1 8-8 Open Internet Explorer. Chapter 8 MyCall System Manual 2 In the Address field, enter the Reports URL. You can find the Reports URL for your system in the System tab in the Edit Configuration dialog box on the Controller PC. 3 Note A login screen appears. Enter the user name and password that you use for logging in to the MyCall system. Leave the default settings in the SQL Server Instance and Database fields. These are for advanced use only. 4 Click Log In. The Reports window appears, giving you access to all system reports. Reports, Diagnostics and Maintenance Generating Reports 8-9 Tag Diagnostics The Tag Diagnostics command is used to perform advanced analysis of the operation of the system. The Tag Messages window displays tag messages in real-time as they are received by the Controller PC. (Tag Diagnostics may be accessed from both the Controller and Client PCs.) You can set various parameters to filter the messages, in order to concentrate on messages from one device or group of devices, as explained below. Viewing Messages from a Specific Tag To view messages from one specific tag, follow this procedure. 1 Open the Xmark menu and choose the Tag Diagnostics command. The Tag Messages window appears. 2 Under Tag(s), enter the ID number of the tag of interest. To view message for several tags, enter each ID number, separated by commas. 3 If you would like to log the messages to the database for retrieval through the Tag Messages report, click on the Log Messages checkbox to display a checkmark. The software will automatically stop logging results to the database if the Tag Messages window is left open for an extended period. This is necessary to prevent the database from becoming full. 4 Click on the Enable Message Display checkbox to display a checkmark. Note 8-10 Chapter 8 MyCall System Manual Messages received from the selected tag(s) will appear in the message window. To stop messages, uncheck the Enable Message Display checkbox. You can clear results by clicking on the Clear List button. Viewing Messages from a Specific LAR To view messages received by one specific LAR, follow this procedure. 1 Open the Xmark menu and choose the Tag Diagnostics command. The Tag Messages window appears. 2 Click on the None button, then select the LAR of interest by clicking on it once in the Nodes list window. You can select more than one LAR. 3 If you would like to log the messages to the database for retrieval through the Tag Messages report, click on the Log Messages checkbox to display a checkmark. The software will automatically stop logging results to the database if the Tag Messages window is left open for an extended period. This is necessary to prevent the database from becoming full. Note 4 Click on the Enable Message Display checkbox to display a checkmark. Messages received by the selected LAR(s) will appear in the message window. To stop messages, uncheck the Enable Message Display checkbox. You can clear results by clicking on the Clear List button. Viewing Only Panic and Tamper Messages This feature is likely only to be used in testing with a specific tag enrolled for that purpose. Follow this procedure. 1 Open the Xmark menu and choose the Tag Diagnostics command. The Tag Messages window appears. 2 Click on the Panic/Tamper/Test Only checkbox to display a checkmark. 3 If you would like to log the messages to the database for retrieval through the Tag Messages report, click on the Log Messages checkbox to display a checkmark. The software will automatically stop logging results to the database if the Tag Diagnostics dialog box is left open for an extended period. This is necessary to prevent the database from becoming full. 4 Click on the Enable Message Display checkbox to display a checkmark. Note Reports, Diagnostics and Maintenance Tag Diagnostics 8-11 All Tamper and Panic alarm messages will appear in the message window. To stop messages, uncheck the Enable Message Display checkbox. You can clear results by clicking on the Clear List button. Interpreting Results The messages displayed in the Tag Messages window are the raw data that the Controller PC interprets to update the information displayed in the software. The Tag Diagnostics function allows you to see what data is being received, but it does not interpret it for you. This requires advanced knowledge of the operation of the system. If you are in any doubt about how to understand the information given in Tag Diagnostics, please contact your Authorized Dealer or VeriChip. Below is a brief explanation of the meaning of each column of results in the Tag Messages window. Date/Time—The date and time the message was sent. Type—This shows the kind of tag. For the MyCall system, this will always display “M/F.” Tag ID—This identifies the tag that sent the message. Beacon/Exciter—Identifies the Beacon location marker most recently detected by the tag. Receiver—This identifies the LAR that relayed the message. RSSI—The Received Signal Strength Indicator (RSSI) value at the time the message was received. Seq—This shows the order in which messages were received from the tag. 8-12 Chapter 8 MyCall System Manual Pri—Indicates whether or not this is Priority Level Message, such as a Tamper alarm. Status—This indicates the type of event or alarm for the tag. Testing LAR Coverage The software features a Coverage Test dialog box, accessed from the Xmark menu, that enables rapid and reliable testing of LAR coverage throughout the facility. Testing can be easily done by a single person. Your facility was thoroughly tested when the system was installed and commissioned. Coverage should also be tested regularly, as conditions can change over time. It is essential to test every room and area covered by the system, including the outer corners of the building. Tools and Materials Required • MyCall Communicator tag (p/n 805A0302). • Map of the facility to note the location and time of each test. How the Test Works Coverage is checked by performing dozens of tests throughout the area covered by the system. Each test shows how well messages from a tag will be received from that specific test location. It is essential, therefore, to test in many parts of each room, not just one spot, because reception can be different just a few feet away. As you prepare to test each room or area, you should decide which spots are most likely to have tags present. Test these locations, and make sure that they receive a full pass in the Coverage Test dialog box. This means that coverage is excellent, with a healthy safety margin to allow for changes in ambient noise and other factors that can affect coverage. You should also test spots where it is less likely that tags will be present; for example, the far corners of rooms. For these spots, a marginal pass may be adequate. This means that tag messages will likely be received, but that there is no safety margin. A brief increase in the ambient noise, for example, could mask the messages from a tag. The Coverage Test feature assesses coverage from each test location based on three criteria: Reports, Diagnostics and Maintenance Testing LAR Coverage 8-13 • The total number of test tag messages received. The test tag sends 16 messages every time it is pressed. The test location will only receive a full pass if at least12 messages are received. For a conditional pass, at least 10 messages are required. • The number of test tag messages received by the strongest LAR. For each test location, one LAR (referred to as the primary LAR) must receive at least eight messages in order to receive a full pass. This criteria does not apply to the conditional pass. • The RSSI strength of the test tag messages relative to the RSSI Threshold of the LARs. A full pass requires that the messages from the tag be comfortably above the RSSI Threshold for all LARs picking up the messages. The software sets this comfort margin automatically. A conditional pass does not include a safety margin. Test Procedure 1 Select Coverage Test from the Xmark menu to open the Xmark Coverage Test dialog box. 2 In the Test Tag ID field, enter the ID number for the test tag as shown on the back of the tag. You may also log all the messages from the test tag to the database by selecting Log Messages. 3 Click the Start button. 4 In several parts of each room and area covered by the system, press the button on the top of the test tag once only. Note the time and location of each test. Wait at least 30 seconds between tests. 5 Return to the PC and click the Stop button. Click the Results button to view a summary of your test results, which you can save as a text file. Interpreting Results Results appear in the Coverage Test dialog box, as in the example below. The “Point” and “Time” columns shows the number and time of the test, which must be cross-referenced with notes taken during testing. The other columns list the LARs that received messages from the test tag, along with the number of messages received. 8-14 Chapter 8 MyCall System Manual Note: Be aware that a test location from which no messages are received will not appear in the test results. Make sure that the time of each test in the results window matches the time recorded in your notes. Total messages received Messages received by primary LAR RSSI safety margin Pass 12 8 Yes Conditional Pass 10 n/a No 9 or less n/a No Fail Corrective Measures If any location indicates a Fail rating, measures will have to be taken to improve coverage in that spot. Depending on the importance of the test location, you may also wish to try to improve coverage for locations that received a Conditional Pass. Contact your Authorized Dealer or VeriChip for assistance. Reports, Diagnostics and Maintenance Testing LAR Coverage 8-15 Database and File Maintenance The active database for the MyCall system is regularly backed up to the archive database in case the active database becomes damaged or inaccessible. In addition, the MyCall system allows you to backup all essential files used by the system, including map files and sound files. Automatic Backup of Database Records The software automatically backs up daily the SQL database that stores system activity information. Follow this procedure to customize settings for your system. 1 Open the Edit Configuration dialog box and select the System tab. Go to Database Maintenance. 2 Under Purge records older than __ Days, select how often to perform the backup. 3 Click on the Backup records before purge checkbox to display a checkmark. If you do not select this setting, records will be permanently deleted. 4 Click OK to save your settings and exit the Edit Configuration dialog box. Warning 8-16 Chapter 8 MyCall System Manual Note The backup file is never overwritten. Every backup session adds to the existing file. Manual Backups You can back up any of the data tables at any time from the System tab. Follow the procedure above, and after Step 3 click the Perform Now button. Backing Up Essential System Files The File menu contains a Backup command that automatically creates copies of essential files used by the system that are unique to your site, including device configuration settings, map files and sound files. These are stored in a compressed backup file with the .fbk extension. This feature is used to guard against the unlikely event of a failure of the hard disk drive on the Controller PC. If these essential files become unreadable, you can copy the backup files to the Xmark directory using the Restore command. VeriChip recommends that the backup procedure described here be performed once a month, and whenever major changes are made to system settings. Backup Procedure It is essential that the backup files be saved to a location other than the drive containing the MyCall system software on the Controller PC (usually C: drive). This could be the hard drive of a Client PC if you are using a local area network, or a removable medium like a ZIP drive. It may also be possible to perform the backup remotely via LapLink, and store the backup files on a PC located at your Authorized Dealer. Consult with your dealer about this service. To perform the backup, complete these steps: 1 From the File Menu, select Backup. Reports, Diagnostics and Maintenance Database and File Maintenance 8-17 2 Click on the Browse button, and navigate to the folder where you intend to store the backup files. This example shows the backup being saved to a folder called “backup” on the hard drive of the Client PC “Client01.” Click OK when you have selected the backup destination. You can define the default backup destination in the System tab of Edit Configuration, under Config Backup Directory. Note 3 The Xmark Backup Procedure dialog box now shows the path to the backup destination. Click OK to perform the backup. The compressed backup file is automatically named using the date and time of the backup. Restore Procedure This procedure should be used as a last resort if the MyCall system software files or the entire hard disk drive on the Controller PC become unreadable. Restore copies parts of the database file, map files and sound files to the Xmark directory, overwriting any files of the same name. 8-18 Chapter 8 MyCall System Manual 1 From the File Menu, select Restore. 2 Click on the Browse button and navigate to the directory containing the compressed backup file, as in the example below. Click OK when you have selected the directory containing the compressed backup. Reports, Diagnostics and Maintenance Database and File Maintenance 8-19 8-20 3 In the Xmark Restore Procedure dialog box, click on the backup in the list window, and then click OK. 4 The following warning message appears. Click Yes to restore the active database and other files. The MyCall system software will shut down automatically. 5 Restart the MyCall system software. The backup will be completed automatically after the MyCall system software reboots. You are now ready to reconfigure the system. 6 From the Xmark menu, run Auto Configure (see page 6-2 for details). The software will automatically apply the configuration settings saved in the backup to each LonWorks network device. This step can take several minutes, depending on the size of the network. Chapter 8 MyCall System Manual Updating Your System License The Update License command is used to update the license on the Controller PC granted by VeriChip for the use of the MyCall system software. This is only necessary when a system is being expanded to include new applications, more tags or additional Client PCs. To update the license, complete these steps. 1 From the Xmark menu, select Update License to open the Xmark License dialog box. 2 Note down the System Number. Send this number to VeriChip Technical Service at [email protected] or call 1-866-5596275, ext. 4. VeriChip will e-mail you an Xmark.lf license file. 3 Close the software. Then copy the Xmark.lf file to the Xmark directory (usually C:\Xmark). You will be asked whether you wish to copy over an existing file of the same name. Click Yes. 4 Start the MyCall system software. The license information will be updated automatically. Reports, Diagnostics and Maintenance Updating Your System License 8-21 Advanced LonWorks Device Procedures This section explains some of the features in the MyCall system software for testing and troubleshooting LARs and I/O Modules. This is very rarely necessary, and VeriChip recommends that you consult your Authorized Dealer before performing any of these procedures. Downloading firmware The firmware is the operating software used by a LonWorks device. The MyCall system software checks and updates the firmware when a device is installed using the Auto Configure command, and whenever the MyCall system software is started. However, manually updating the firmware is one of the troubleshooting steps used to diagnose a problem with a LonWorks device. Follow these procedures. Warning 8-22 Downloading firmware overwrites the current firmware in the device. Interrupting the download for any reason, including pressing Cancel, will render the device inoperable. You must install the firmware ensuring no interruptions occur before the device can operate properly. Also note that all devices of the same kind must be using the same firmware version. Chapter 8 MyCall System Manual Downloading LAR Firmware 1 From the Xmark menu, select Install LonWorks Devices. 2 Select the LAR in the Device Status window by clicking on it once. 3 Click on the Download button. Reports, Diagnostics and Maintenance Advanced LonWorks Device Procedures 8-23 4 The Download Receiver OS dialog box shows the status of the LAR, and the currently loaded firmware. Make sure that the Disk version number equals or exceeds the Device version number. (The Device version of the RAM Loader always appears as N/A.) 5 Click on the Download Receiver OS button to download the firmware that controls the LAR. In the dialog box that appears, click Yes to continue. The download typically takes one to two minutes. Once the download is completed, check that the Disk and Device firmware version numbers are identical. 6 Click on the Download Communication OS button to download the firmware that controls communications between the LAR and the Controller PC. In the dialog box that appears, click Yes to continue. Once the download is completed, check that the Disk and Device firmware version numbers are identical. The Download All Nodes command is used to download firmware to all LARs. Do not use this command unless you wish to update the firmware for all LARs on the network. This can take several minutes. 7 Click Close to exit the Download Receiver OS dialog box. Note Downloading I/O Module Firmware 8-24 1 From the Xmark menu, select Install LonWorks Devices. Select the I/O Module in the Device Status window by clicking on it once. 2 Click on the Download button. 3 From the Type dropdown list, select the model of I/O Module you are using. Most systems use the Di80F. The model type is indicated on the I/O Module itself. 4 Click on the Download OS button to download the firmware to the I/O Module. 5 Click Close to exit the Download Neuron dialog box. Chapter 8 MyCall System Manual Using the Download Neuron Command The LonWorks Device Installation dialog box contains a special command to download firmware to a LonWorks device that is not functioning properly. Download Neuron enables you to download any type of firmware to a device that the software was unable to configure. Use this feature only under guidance from your Authorized Dealer. Warning Downloading the wrong firmware will disable the device. Exercise caution. 1 From the Xmark menu, select Install LonWorks Devices. Reports, Diagnostics and Maintenance Advanced LonWorks Device Procedures 8-25 2 Click on the Download Neuron button. The Download Neuron dialog box appears. 3 The Uninstalled Devices list window displays all unconfigured devices. The Program ID column indicates the kind of device. Select the device you wish to configure by clicking on it once. 4 From the Neuron Type dropdown menu, select the kind of firmware to be sent to the device. Be very sure that you have made the right selection, as downloading the wrong firmware can disable the device. Also note that the firmware for the Single-Antenna LAR is different from that for the DualAntenna LAR. 5 Click Download Neuron to send the firmware to the device. 6 Click Close to exit the Download Neuron dialog box. Diagnostic Tools The following commands in the LonWorks Device Installation dialog box are used to evaluate the operation of LonWorks devices. Select the device of interest in the Device Status Window before applying these actions. Wink every 3 seconds This sends a signal to the LonWorks network device to turn on its LED light for one second then turn it off for three seconds repeatedly. This feature is used to help locate a device and check its operation. Messages enabled (LAR) This command enables all tags messages to be sent from the selected LAR to the Controller PC. Disabling this command stops all tag messages from the device except for priority messages, such as alarms. Maintenance Mode You may wish to use this setting when performing adjustments to a device. While in Maintenance Mode, devices will not generate communication error or 8-26 Chapter 8 MyCall System Manual other alarms. Note that LARs will continue to send tag messages to the Controller PC so that infants are fully protected at all times. This setting automatically times out after a certain period. Reset This command turns the selected LonWorks network device off then on again. Test This command checks the communications between the LonWorks network device and the Controller PC over the network. Details This provides system information used for advanced diagnostics. Delete The Delete command removes a device from the system. Cold Reset NSS This command is used to clear the LonWorks network database when communications on the network become out of sync. This procedure is only rarely necessary. Consult your Authorized Dealer or VeriChip before using this command. Enable Msgs Click on this button to allow all devices to relay all messages after the LonWorks installation process. Normally, messages are enabled automatically, but if you cancel a firmware download, you may have to use this command to receive messages from the affected device. LAR Settings Enable LED This checkbox enables you to turn the Status LED on or off. To activate the LED, make sure a checkmark is displayed. This setting does not affect the operation of the LAR. I/O Module Settings Debounce The Debounce is the time in milliseconds that the system waits before responding when the input contacts switch from closed to open (or vice versa). This wait time is necessary to allow the contacts to settle after changing state. The default setting of 30 milliseconds is adequate for most input devices. Reports, Diagnostics and Maintenance Advanced LonWorks Device Procedures 8-27 This setting was made when the I/O module was installed, and should not be changed. Update Click on this button after changing the Debounce value to send the new value to the I/O Module. Points This area is used to test the operation of output devices. Click on a checkbox to display a checkmark, and then click on the Test button. The device connected to that point on the I/O Module will activate for the Timeout period. Points connected to input devices will appear grayed out. 8-28 Chapter 8 MyCall System Manual Appendix A ALARM QUICK REFERENCE CHAPTER 0 The Quick Reference Table in this chapter lists all alarms generated by the MyCall system software. Alarm Quick Reference A-1 Alarm Message Tags “Tag Panic“ “Tag Tamper“ “Supervision Timeout“ “No motion detected“ LARs “Tag location changed“ “Tag low battery” “High Ambient Noise” Cause The wearer of a Communicator tag has pressed the Panic button. A Wall Mount tag has been pressed. System has not seen a Tag or Communicator tag within the Supervision Timeout period. Tag or Communicator tag has remained motionless for the No Motion Timeout period. Tag or Communicator tag has changed location. Tag or Communicator tag is losing battery power. Average noise around the LAR has exceeded the RSSI threshold value. Response Possible personal duress. Implement security procedure immediately. Someone has called for help from the identified location. Implement security procedure immediately. Check Alarm window for most recently known location, and initiate security measures. Check Alarm window for location, and initiate security measures. Check Alarm window for location, and initiate security measures. Replace battery. 1 2 3 A-2 Appendix A MyCall System Manual Check that the LAR is properly installed. Single-antenna LAR: antenna points downward. Dualantenna LAR: main antenna points downward, secondary antenna points away from metal objects. Generate a Receiver Stats report. This shows the RSSI, measured every 30 minutes. Check for a pattern in noise variation. It may be possible to: a) Identify noise sources, such as new or mobile equipment. Eliminate these or; b) Optimize the RSSI Threshold. Set it to 1 count above the highest RSSI recorded in the last week. Raising the threshold may reduce LAR coverage, and if set too high, effectively disable the LAR. Retest coverage after every increase in RSSI. If coverage is inadequate as a result of raising the RSSI Threshold, the LAR will have to be moved, or another LAR added. Alarm Message Cause “Coverage Changed” “Receiver status error” The RSSI Threshold for the LAR has been raised. Memory error in the LAR. “Receiver Unknown to System” “Communication failure” “Service pin message” System has detected a configured LAR that it has no record of. System cannot communicate with the LAR. It is no longer seen on the LonWorks network. The service pin on the LAR was pressed. “Supervision timeout” System is not receiving messages from the LAR. Beacon location markers “Low Battery“ PCs “Supervision timeout” “CPU alarm threshold exceeded” “Watchdog timer failed or not present” “I/O Module Input Open” The batteries in the Beacon location marker are dying. System is not receiving messages from the tag installed near the Beacon location marker. Controller PC has lost communication with Client PC. CPU loading on the Controller PC has exceeded the set threshold. The PC watchdog card on the Controller PC has been removed or is not functioning. The input device of an I/O Module is in the open state. “I/O Module Input Closed” The input device of an I/O Module is in the closed state. LARs I/O Modules “Supervision timeout“ Response Test LAR coverage in the area of the indicated LAR. The most likely cause is interrupted firmware download. Download the firmware again. If the problem persists, replace the LAR. Run Auto Configure, and install the LAR into the software. Inspect the LAR. Check power and network connections. If these appear normal, replace the LAR. This feature is for test purposes to check communication between the device and the Controller. These alarms auto-clear when the condition ends. Intermittent alarms may be caused by temporary conditions, such as unusually high network traffic, or heavy demands on the CPU. If the alarm appears constantly, replace the device. Replace the batteries with two 9 VDC alkaline or 7 VDC lithium batteries. Beacon location marker's signal is being blocked. Check the Beacon location marker. Contact the operator of the Client PC, and have them reconnect to the LAN. Contact your dealer or VeriChip for guidance. Check that the PC watchdog card is properly installed and functioning. This alarm is a configurable setting. Response depends on facility procedures. This alarm is a configurable setting. Response depends on facility procedures. Alarm Quick Reference A-3 Alarm Message Cause Response “Communication failure” System cannot communicate with the I/O Module. It is no longer seen on the LonWorks network. “Service pin message” The service pin on the I/O Module was pressed. “Supervision timeout” System is not receiving messages from the I/O Module. Pager System “Pager Comm Error” LonWorks Network Alarms “Supervision timeout” The MyCall system software could not send a page message. Network devices are defined in the system but no messages have been received from any device for 30 seconds. The LonWorks card is not functioning properly, or drivers are not properly configured. The queue of messages for the LonWorks device has exceeded the maximum allowed. A user has failed to enter the correct password. Inspect the I/O Module. Check power and network connections. If these appear normal, replace the I/O Module: contact your dealer or VeriChip. This feature is for test purposes to check communication between the device and the Controller. These alarms auto-clear when the condition ends. Intermittent alarms may be caused by temporary conditions, such as unusually high network traffic, or heavy demands on the CPU. If the alarm appears constantly, replace the device: contact your dealer or VeriChip. Check that the Pager is connected to the Controller PC and powered. I/O Modules “The Receiver network is not communicating” “Message queue overflow” System Alarms “Maximum login attempt” “Space on the configuration database is low” “Space on the database backup disk is low” A-4 Appendix A MyCall System Manual Insufficient space on the hard disk containing the configuration database. Insufficient space on the hard disk containing the database backup. Check that the network wire is securely connected to the card. If the connection seems OK, there may be a problem with the LonWorks card. There may be a problem with the LonWorks card. This is a temporary condition cause by unusually high network traffic, or heavy demands on the CPU. This is a configurable alarm. The maximum number of login attempts is set in the System tab of the Edit Configuration dialog box. The user name of the person attempting to log in is recorded in the database. Delete unneeded files to create more space on the hard disk. Delete unneeded files to create more space on the hard disk. Alarm Message System Alarms Cause “Database field error” The database is corrupt. “Database file error” The database is corrupt. “Database record limit exceeded” The maximum number of tags or devices, as granted in the MyCall system software license, has been exceeded. Response Restore the database from the backup. All data recorded since the last backup will be lost. Restore the database from the backup. All data recorded since the last backup will be lost. Obtain a new license from VeriChip, and update the license using the Update License command. Alarm Quick Reference A-5 A-6 Appendix A MyCall System Manual INDEX CHAPTER 0 About Xmark Command, 2-14 Alarm Notes when Alarms Cleared, 3-9 Alarm Procedures, 3-8 Alarm Quick Reference, A-1 Alarm Window, 5-2 adding procedures, 3-8 displaying using Toolbar Alarms button, 2-5 Alarms alarm types, A-1 displaying pictures, 5-3 I/O Module input alarms, configuring, 6-8 I/O Module output alarms, configuring, 6-10 Low Battery Alarms, 5-10 No Motion Detected Alarms, 5-8 Panic Alarms, 5-4 response procedures, 5-1 sounds for, 3-16 Supervision Timeout Alarms, 5-7 Tag Location Changed Alarms, 5-9 Tamper Alarms, 5-6 Arrange Icons Command, Window menu, 2-8 Auto Configure, 6-2 sounds, assigning to alarms, 3-16 sounds, generic alarm sounds, 3-18 sounds, specific alarm sounds, 3-19 Communicators adding several at once, 3-4 adding to software, 3-2 assigning a picture to, 3-6 checking location and status, 4-4 deleting, 3-5 description, changing, 4-7 finding a specific tag, 4-5 locating on a map, 4-5 No Motion Timeout, enabling, 6-13 overview, 1-3 tag memos, 4-6 Controller PC alarm properties, 6-15 sounds, assigning to alarms, 3-16 sounds, generic alarm sounds, 3-18 sounds, specific alarm sounds, 3-19 startup options, 3-24 Coverage Test for LARs, 8-13 Custom Reports, 8-7 B D A Backup Command, 8-17 Basic Procedures, 4-1 Beacons adding several at once, 6-14 adding to software, 6-12 overview, 1-4 C Cascade Command, Window menu, 2-7 Charts in reports, 8-6 Client PC alarm properties, 6-15 Database automatic backup, 8-16 Backup command, 8-17 manual backup, 8-17 Restore command, 8-18 Debounce, 8-27 Diagnostic Tools, 8-26 Download Neuron Command, 8-25 E Edit Configuration displaying using Toolbar button, 2-5 Index I-1 F Firmware I/O Module, 8-24 LAR, 8-23 G Generic Alarm Sounds, 3-18 Getting Help, 2-13 H Help File, 2-13 I I/O Module Debounce setting, 8-27 firmware downloading, 8-24 input alarm settings, 6-8 inputs, configuring, 6-8 installing in the software, 6-2 Maintenance Mode, 8-26 output alarm settings, 6-10 outputs, configuring, 6-10 setup in the software, 6-7 Icon Properties, 7-4 Icons adding to maps, 7-3 deleting, 2-9 hiding and displaying, 2-8 moving, 2-9 Images, assigning to tags, 3-6 Initial Setup, 3-1 Install LonWorks Devices, 6-2 Installing and Configuring Devices, 6-1 L LapLink starting with the PC, 3-24 LAR Statistics Command, 8-2 Large Buttons Command, 2-5 License, see front matter updating, 8-21 I-2 Index MyCall System Manual Limitation of Liability, see front matter Local Area Receiver coverage test, 8-13 diagnostic tools, 8-27 firmware downloading, 8-23 installing in the software, 6-2 LAR statistics, checking, 8-2 Maintenance Mode, 8-26 overview, 1-5 RSSI Threshold, setting, 6-4 setup in the software, 6-3 Locking a User Account, 3-14 Log Priority Tag Messages, 8-5 Login, 4-2 changing your password, 4-3 maximum login attempts, setting, 3-12 timeout setting, for individual users, 3-14 timeout setting, in User Templates, 3-11 Toolbar button, 2-5 with access card, 4-2 LonWorks Device Installation, 6-2 diagnostic tools, 8-26 LAR diagnostic tools, 8-27 Maintenance Mode, 8-26 Low Battery Alarms, 5-10 M Main Interface, 2-2 Map and Status Window, 2-2 Toolbar button, 2-5 Map Window, 2-6 changing appearance, 2-6 LAR Statistics command, 8-2 properties, changing, 2-7 size, changing, 2-6 Toolbar, 2-6 Maps adding icons to, 7-3 adding to the software, 7-2 N RSSI Threshold, setting, 6-4 No Motion Detected Alarms, 5-8 S P Page Messages format, 6-21 sending manually, 6-21 Pager Systems, 6-18 configure tags & devices to send pages, 620 installation, 3-24 manual pages, 6-21 message format, 6-21 software setup, 6-19 TAP, entering ID number in user account, 313 Panic Alarms, 5-4 Password Control through User Accounts, 310 Passwords assigning, 3-13 changing, 4-3 enabling, 3-12 enabling enhanced passwords, 3-12 maximum login attempts, setting, 3-12 PC Alarm Properties, 6-15 Pictures, assigning to tags, 3-6 Pre-Recorded Alarm Message, 3-20 Printing, 2-12 Toolbar Print button, 2-5 Procedures, adding to Alarm window, 3-8 R Reports, 8-3 charts, 8-6 custom reports, 8-7 Toolbar button, 2-5 types of, 8-4 viewing remotely, 8-8 Responding to Alarms, 5-1 Restore Command, 8-18 Send Page Toolbar Button, 2-5 Sound Alarms at the PC, 3-16 Sounds, adding to software, 3-16 Specific Alarm Sounds, 3-19 Split Command, Window menu, 2-8 Start LapLink when Xmark is started, 3-24 Start Xmark as the Shell, 3-24 Start Xmark when the PC is started, 3-24 Status Bar, 2-10 Status Window, 2-2 column width, 2-4 Toolbar, 2-5 window size, 2-5 Supervision Timeout Alarms, 5-7 System Information, accessing, 2-14 System License, updating, 8-21 T Tag Diagnostics, 8-10 interpreting results, 8-12 viewing messages from one LAR, 8-11 viewing messages from one tag, 8-10 viewing Panic & Tamper messages, 8-11 Tag Location Changed Alarms, 5-9 Tag Memos, 4-6 Tags adding several at once, 3-4 adding to software, 3-2 assigning a picture to, 3-6 checking location and status, 4-4 deleting, 3-5 description, changing, 4-7 finding a specific tag, 4-5 locating on a map, 4-5 No Motion Timeout Alarms, enabling, 6-13 overview, 1-3 tag memos, 4-6 Tamper Alarms, 5-6 Index I-3 Text-to-Speech Engine, 3-21 Tile Command, Window menu, 2-7 Touch Screen, 2-10 U Unlocking a User Account, 3-14 User Accounts, 3-10 changing, 3-14 creating, 3-11 list of user permissions, 3-14 locking and unlocking, 3-14 User Templates, creating, 3-10 W Wall Mounted Tag, 3-4 Warnings, see front matter What’s New, 1-7 Window Menu, 2-7 Wink every 3 seconds, 8-26 Z Zones Beacons, assigning to, 6-12 creating, 7-5 I/O Module inputs, assigning to, 6-8 I/O Module outputs, assigning to, 6-10 PCs, assigning to, 7-7 I-4 Index MyCall System Manual